Год издания: 2005
Количество страниц: 638
В продаже с 18.01.2012
Как только книга Writing Security Tools and Exploits станет доступна для заказа в одном из интернет-магазинов, Вам на e-mail будет отправлено уведомление.Укажите e-mail для связи:
Learn to Write the Security Tools the Other Books Only Teach You to Use Exploits. In information technology circles, the term exploits has become synonymous with vulnerabilities. It is a scary word that can keep you up at night wondering if you have purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and patched your entire environment. It's also a topic that can enter the security water-cooler discussions faster than McAfee's new wicked antivirus software or Symantec's latest acquisition. Exploits are proof that the computer science or software programming community still does not have an understanding of how to design, create, and implement secure code. Write Solid Shellcode Learn the techniques used to make the most out of vulnerabilities by employing the correct shellcode. Reverse Connection Shellcode See how reverse connection shellcode makes a connection from a hacked system to a...