Hacking 2nd Edition

An introduction to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, network security, cryptographic attacks, and shellcode.

Hacking  2nd Edition

Hacking 2nd Edition

An introduction to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, network security, cryptographic attacks, and shellcode.

More Books:

Hacking, 2nd Edition
Language: un
Pages: 488
Authors: Jon Erickson
Categories: Computers
Type: BOOK - Published: 2008 - Publisher: No Starch Press

An introduction to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, network security, cryptographic attacks, and shellcode.
The Shellcoder's Handbook
Language: un
Pages: 744
Authors: Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
Categories: Computers
Type: BOOK - Published: 2007-08-20 - Publisher: Wiley

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking
The Basics of Hacking and Penetration Testing
Language: un
Pages: 204
Authors: Patrick Engebretson
Categories: Computers
Type: BOOK - Published: 2013 - Publisher: Syngress Press

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage
Black Hat Python
Language: un
Pages: 192
Authors: Justin Seitz
Categories: Computers
Type: BOOK - Published: 2014-12-14 - Publisher: No Starch Press

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You’ll learn how to: Create a trojan command-and-control using GitHubDetect sandboxing and automate com­mon
Penetration Testing
Language: un
Pages: 528
Authors: Georgia Weidman
Categories: Computers
Type: BOOK - Published: 2014-06-14 - Publisher: No Starch Press

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a

Popular All Time

Ten Trees and a Truffle Dog
Greenlights
Untamed
Will
Can't Hurt Me
A Stolen Life
Born a Crime
Somebody's Daughter
Little and Often
The Code Breaker
Battle of Brothers
Educated
In Order to Live
To Selena, with Love
Empire of Pain
Fatherhood media tie-in (previously published as Two Kisses for Maddy)
A Promised Land
Yearbook

Recent Books: