The Shellcoder's Handbook: Discovering and Exploiting Security Holes
来源:互联网 发布:ubuntu 安装povray 编辑:程序博客网 时间:2024/05/29 07:13
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
*This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
*New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
*Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
http://rapidshare.com/files/70914822/047008023X.zip
http://depositfiles.com/files/2427420
*This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
*New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
*Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
http://rapidshare.com/files/70914822/047008023X.zip
http://depositfiles.com/files/2427420
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes
- The Web Application Hacker's Handbook: Discovering and Exploiting, Security Flaws (Paperback) Oct.2007.eBook-BBL
- The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd
- 《The Shellcoder’s Handbook》代序-----你尽力了吗?
- google's browser security handbook
- The Debugger's Handbook
- The Oracle Hacker's Handbook: Hacking and Defending Oracle
- The Oracle Hacker's Handbook: Hacking and Defending Oracle
- Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
- The J2EE Architect's Handbook
- The J2EE Architect's Handbook
- Handbook of Database Security: Applications and Trends
- RFID Handbook: Applications, Technology, Security, and Privacy
- VoIP Handbook: Applications, Technologies, Reliability, and Security
- 【笔记】Discovering and Exploiting Deterministic Label Relationships in Multi-Label Learning
- The International Handbook of Computer Security
- The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
- Class文件版本随意看
- Aspect-Oriented Programming with the e Verification Language: A Pragmatic Guide for Testbench Develo
- ACE:Reactor框架--处理事件及多个I/O流
- Professional Community Server Themes
- Beginning Spring 2: From Novice to Professional
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes
- Beginning PL/SQL: From Novice to Professional
- Ultraedit语法高亮显示
- 在C#中,比较两个数组的不同值.输出出来对于日常.NET编程比较实用
- Virtual Vixens: 3D Character Modeling and Scene Placement
- SEPG 工作完成
- Creating Mobile Games: Using Java ME Platform to Put the Fun into Your Mobile Device and Cell Phone
- 递归的使用——关于括号排列(分别使用Java和C++算法实现)
- Data Mining Using SAS Enterprise Miner