free tracker
Categories Unlimited Books

Writing Security Tools and Exploits



Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code…



Buffer Overflow Attacks

Pub Date : 2005-01-29 | Author : Jason Deckard | Publisher : Elsevier

ISBN 10 : 0080488420
ISBN 13 : 9780080488424

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, ma..


Network Security Tools

Pub Date : 2005 | Author : Nitesh Dhanjani | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 0596007949
ISBN 13 : 9780596007942

This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses ..



Hacking The Code

Pub Date : 2004-05-10 | Author : Mark Burnett | Publisher : Elsevier

ISBN 10 : 0080478174
ISBN 13 : 9780080478173

Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hun..


Hacking Exposed Wireless

Pub Date : 2007-04-10 | Author : Johnny Cache | Publisher : McGraw Hill Professional

ISBN 10 : 9780071509695
ISBN 13 : 0071509690

Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this..


Zero Day Exploit

Pub Date : 2004-07-16 | Author : Rob Shein | Publisher : Syngress

ISBN 10 : 0080543928
ISBN 13 : 9780080543925

The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Altho..


Leave a Reply

Your email address will not be published. Required fields are marked *