9780764544682-0764544683-The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

ISBN-13: 9780764544682
ISBN-10: 0764544683
Edition: 1
Author: Chris Anley, Neel Mehta, David Litchfield, Jack Koziol, Dave Aitel, Sinan "noir" Eren, Riley Hassell
Publication date: 2004
Publisher: Wiley
Format: Paperback 644 pages
FREE US shipping

Book details

ISBN-13: 9780764544682
ISBN-10: 0764544683
Edition: 1
Author: Chris Anley, Neel Mehta, David Litchfield, Jack Koziol, Dave Aitel, Sinan "noir" Eren, Riley Hassell
Publication date: 2004
Publisher: Wiley
Format: Paperback 644 pages

Summary

The Shellcoder's Handbook: Discovering and Exploiting Security Holes (ISBN-13: 9780764544682 and ISBN-10: 0764544683), written by authors Chris Anley, Neel Mehta, David Litchfield, Jack Koziol, Dave Aitel, Sinan "noir" Eren, Riley Hassell, was published by Wiley in 2004. With an overall rating of 4.2 stars, it's a notable title among other Computer Certification (Software, Security & Encryption) books. You can easily purchase or rent The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback) from BooksRun, along with many other new and used Computer Certification books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.42.

Description

  • Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again
  • A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system
  • Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases)
  • Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book