Hacking: The Art of Exploitation
来源:互联网 发布:文泰刻绘端口安装 编辑:程序博客网 时间:2024/04/28 22:18
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
http://rapidshare.com/files/51590797/1593270070.zip
http://rapidshare.com/files/51590797/1593270070.zip
- Hacking: The Art of Exploitation
- Hacking: The Art of Exploitation
- Hacking: The Art of Exploitation 读书笔记(一)代码调试技巧
- Hacking: The Art of Exploitation 读书笔记(二)C文件I/O
- The art of exploitation - Chapter 4
- The Art of Exploitation 2nd Edition (Jon Erickson), Official LiveCD ISO
- Blackhat EU 2013 - HACKING APPLIANCES: IRONIC EXPLOITATION OF SECURITY PRODUCTS
- The Art of Java
- The Art of C++
- The Art of SQL
- The Art of Rails
- the art of conclusion
- The art of deception
- the Art of Life
- The Art of Debugging
- State-of-the-art
- The art of report
- The Art of Logging
- Oracle Real Application Clusters
- Six Sigma and the Product Development Cycle
- Scheduling in Real-Time Systems
- Intrusion Detection & Prevention
- Malicious Mobile Code: Virus Protection for Windows
- Hacking: The Art of Exploitation
- Malware: Fighting Malicious Code
- Windows Forensics and Incident Recovery
- Security Warrior
- Web Hacking: Attacks and Defense
- Professional ADO.NET 2: Programming with SQL Server 2005, Oracle, and MySQL
- Java™ Development on PDAs: Building Applications for PocketPC and Palm Devices
- Java In A Nutshell, 5th Edition
- Developer's Workshop to COM and ATL 3.0