The Shellcoder's Handbook: Discovering and Exploiting Security Holes
"Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."--Resource description page.
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified]
John Wiley & Sons Incorporated
2004
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627199506719 |
Sumario: | "Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."--Resource description page. |
---|---|
Notas: | Bibliographic Level Mode of Issuance: Monograph |
Descripción Física: | 1 online resource (xxiii, 620 p.) : ill |