The shellcoder's handbook discovering and exploiting security holes
"Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."--Resource description page
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Indianapolis, Ind.
Wiley Pub.
2004
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Summary: | "Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."--Resource description page |
---|---|
Item Description: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 May be limited to subscribing institutions |
Physical Description: | xxiii, 620 pages illustrations |
ISBN: | 0764544683 9780764544682 |