Writing Security Tools and Exploits
1153 Kč
Sleva až 70% u třetiny knih
Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.
Autor: | James C. Foster |
Nakladatel: | Syngress Media,U.S. |
ISBN: | 9781597499972 |
Rok vydání: | 2006 |
Jazyk : | Angličtina |
Vazba: | Paperback |
Počet stran: | 650 |
Mohlo by se vám také líbit..
-
Security Risk Management
Evans V., DooleyJ., Wheeler A.
-
Automating Open Source Intelligence
Robert A. Slayton
-
Violent Python
O'Connor, TJ
-
Keys to the Kingdom
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
The Basics of Cyber Warfare
Winterfeld, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity
-
SQL Injection Attacks and Defense
Clarke-Salt, Justin
-
Google Hacking for Penetration Testers
Long, Johnny (Security Researcher); Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof. at Marshall Univers
-
Windows Performance Analysis Field G...
Huffman, Clint (Senior Premier Field Engineer at Microsoft)
-
A Guide to Kernel Exploitation
Perla, Enrico