Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of about 45 related to Hacking: The Art of Exploitation.   

Hacking: The Art of Exploitation, 2nd Edition

Jon Erickson - Computers - 2008 - 488 pages
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many ...
Limited preview - About this book

Penetration Testing: A Hands-On Introduction to Hacking

Georgia Weidman - COMPUTERS - 2014 - 528 pages
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration ...
Limited preview - About this book

Cyber Hacking: Wars in Virtual Space

Scientific American Editors - Computers - 2013 - 50 pages
Cyber Hacking: Wars in Virtual Space by the editors of Scientific American Cyberspace has certainly transformed the world. From media and communications to banking, an ...
Limited preview - About this book

Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing ...

Himanshu Sharma - Computers - 2017 - 376 pages
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali ...
Limited preview - About this book

Penetration Testing with Shellcode: Detect, exploit, and secure network ...

Hamza Megahed - Computers - 2018 - 346 pages
Master Shellcode to leverage the buffer overflow concept Key Features Understand how systems can be bypassed both at the operating system and network level with shellcode ...
Limited preview - About this book

Web Services Security

Mark O'Neill - Computers - 2003 - 312 pages
No preview available - About this book

Intrusion Detection with Snort

Jack Koziol - Computers - 2003 - 340 pages
No preview available - About this book

Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort ...

Rafeeq Ur Rehman - Computers - 2003 - 263 pages
This guide to Open Source intrusion detection tool SNORT features step-by-step instructions on how to integrate SNORT with other open source products. The book contains ...
Limited preview - About this book

Cisco IOS Access Lists

Jeff Sedayao - Computers - 2001 - 260 pages
This guide focuses on access lists that are critical to network and Internet security. Access lists are a main part of the Cisco IOS that are used to control access, route ...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search