Hacking the Art of Exploitation 2 Editionseeders: 14
leechers: 2
Hacking the Art of Exploitation 2 Edition (Size: 708.57 MB)
Description
####### ##### ########## ############ ###############
##### ### ##### ### ## ### ################# #### ### ### ## ## ### ### ##### ### ### ### # ## ### ## #### ### ### ### ### # ### ### ### ### ### ### ### ### ### ### ### ####### ###### ### ### ### ####### ###### ### ##### ### ### ### ### ##### ### ### ### ### ### ### ### ### ### ### ### ### ### ### ### ### ### ### # ### ### ### ### ### ## ### ## ### #### #### ### ### ##### ## ### ####### ## ##### #### ############ ## ### ################# ###### ###### ########## ########### ################## ############################################################# #----------- http://kill-system32.blogspot.com/ -----------# ############################################################# #------http://kill-system32.bplaced.net/forum/index.php-----# ############################################################# -------------------------------------------------------------------------- In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD. Annotation This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. -------------------------------------------------------------------------- Includes Live cd and READ ME. Related Torrents
Sharing Widget |
All Comments