The shellcoder's handbook : discovering and exploiting security holes /
"Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."--Resource description page
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | Koziol, Jack |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Wiley Pub.,
2004.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
The shellcoder's handbook : discovering and exploiting security holes /
Publicado: (2007) -
The security risk assessment handbook : a complete guide for performing security risk assessments /
por: Landoll, Douglas J.
Publicado: (2021) -
Risk centric threat modeling : process for attack simulation and threat analysis /
por: Uceda Vélez, Tony, 1976-, et al.
Publicado: (2015) -
Assessing and Managing Security Risk in IT Systems
por: McCumber, John
Publicado: (2004) -
Solving Cyber Risk : Protecting Your Company and Society.
por: Coburn, Andrew
Publicado: (2018)