Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 8 of about 8 related to Hacking: The Art of Exploitation.   

Hacking, 2nd Edition: The Art of Exploitation

Jon Erickson - COMPUTERS - 2008 - 488 pages
An introduction to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, network security, cryptographic ...
Limited preview - About this book

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte - Computers - 2011 - 744 pages
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any ...
Limited preview - About this book

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams - Computers - 2011 - 720 pages
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws ...
Snippet view - About this book

Hack Proofing Your Network 2E

Syngress - Computers - 2002 - 704 pages
A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers ...
Limited preview - About this book

Security Warrior

Cyrus Peikari, Anton Chuvakin - Computers - 2004 - 556 pages
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with ...
Limited preview - About this book

Penetration Testing: A Hands-On Introduction to Hacking

Georgia Weidman - COMPUTERS - 2014 - 528 pages
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration ...
Limited preview - About this book

Network Security Tools: Writing, Hacking, and Modifying Security Tools

Nitesh Dhanjani, Justin Clarke - Computers - 2005 - 344 pages
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with ...
Limited preview - About this book

Certified Ethical Hacker (CEH) Cert Guide

Michael Gregg - Computers - 2013 - 704 pages
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and ...
Limited preview - About this book

  1. My library
  2. Help
  3. Advanced Book Search