BOOKS - NETWORK TECHNOLOGIES - Защита от взлома сокеты, эксплойты, shеll-код...
US $9.92
507518
507518
Защита от взлома сокеты, эксплойты, shеll-код
Author: Джеймс Фостер, при участии Майка Прайса
Year: 2006
Number of pages: 783
Format: PDF
File size: 103 MB
Language: RU
Year: 2006
Number of pages: 783
Format: PDF
File size: 103 MB
Language: RU
In his new book, James Foster, author of a number of best-selling books, describes for the first time the methods that hackers use to attack operating systems and application programs. He gives examples of working code in CC++, Java, Perl and NASL, which illustrate methods for detecting and protecting against the most dangerous attacks.