Product Description
- This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
- New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
- Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
- The companion Web site features downloadable code files
Customers Who Bought This Item Also Bought
- Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
- Red Team Development and Operations: A practical guide
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- Hacking: The Art of Exploitation, 2nd Edition
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
- The Hacker Playbook 3: Practical Guide To Penetration Testing
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
- Windows Internals, Part 1 (Developer Reference)
- Reversing: Secrets of Reverse Engineering
*If this is not the "
The Shellcoder's Handbook: Discovering and Exploiting Security Holes" product you were looking for, you can check the other results by
clicking this link.
Details were last updated on Nov 15, 2024 23:53 +08.