Writing Security Tools and Exploits
1153 Kč
Sleva až 70% u třetiny knih
Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.
Autor: | James C. Foster |
Nakladatel: | Syngress Media,U.S. |
ISBN: | 9781597499972 |
Rok vydání: | 2006 |
Jazyk : | Angličtina |
Vazba: | Paperback |
Počet stran: | 650 |
Mohlo by se vám také líbit..
-
The Basics of Cyber Warfare
Winterfeld, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity
-
Practical Lock Picking
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
Threat Forecasting
Pirc, John (Director, Security Solutions, Forsythe Technology and Co-Founder & Advisor, Bricata, LLC); DeSanto, David (D
-
Applied Network Security Monitoring
Chris Sanders
-
Google Hacking for Penetration Testers
Long, Johnny (Security Researcher); Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof. at Marshall Univers
-
Keys to the Kingdom
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
Violent Python
O'Connor, TJ