This Book is in Good Condition. Clean Copy With Light Amount of Wear. 100% Guaranteed. Buchnummer des Verkäufers
Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code?including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.
Über den Autor: Ivan Sklyarov writes the "X-Puzzles" column in Hacker magazine and is the author of Puzzles of Hackers.
Buchbeschreibung A-List Publishing. Paperback. Buchzustand: VERY GOOD. Very Good copy, cover and pages show some wear from reading and storage. Binding may have light creases. Lots of life left in these pages. Buchnummer des Verkäufers 2719706096
Buchbeschreibung A-List Publishing, 2006. Paperback. Buchzustand: Good. Good condition, some are ex-library and can have markings. Buchnummer des Verkäufers GD-108-31-1069911
Buchbeschreibung A-List Publishing, 2006. Paperback. Buchzustand: New. Buchnummer des Verkäufers P111931769613
Buchbeschreibung A-List Publishing, 2006. Paperback. Buchzustand: New. Buchnummer des Verkäufers DADAX1931769613