Writing Security Tools and Exploits
1153 Kč
Sleva až 70% u třetiny knih
Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.
Autor: | James C. Foster |
Nakladatel: | Syngress Media,U.S. |
ISBN: | 9781597499972 |
Rok vydání: | 2006 |
Jazyk : | Angličtina |
Vazba: | Paperback |
Počet stran: | 650 |
Mohlo by se vám také líbit..
-
The Basics of Cyber Warfare
Winterfeld, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity
-
Security Risk Management
Evans V., DooleyJ., Wheeler A.
-
Automating Open Source Intelligence
Robert A. Slayton
-
Violent Python
O'Connor, TJ
-
Keys to the Kingdom
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
Google Hacking for Penetration Testers
Long, Johnny (Security Researcher); Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof. at Marshall Univers
-
A Guide to Kernel Exploitation
Perla, Enrico
-
Applied Network Security Monitoring
Chris Sanders
-
Threat Forecasting
Pirc, John (Director, Security Solutions, Forsythe Technology and Co-Founder & Advisor, Bricata, LLC); DeSanto, David (D
-
Practical Lock Picking
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and