BOOKS - NETWORK TECHNOLOGIES - Защита от взлома сокеты, эксплойты, shеll-код...
Защита от взлома сокеты, эксплойты, shеll-код - Джеймс Фостер, при участии Майка Прайса 2006 PDF ДМК-Пресс BOOKS NETWORK TECHNOLOGIES
US $9.92

Views
507518
Защита от взлома сокеты, эксплойты, shеll-код
Author: Джеймс Фостер, при участии Майка Прайса
Year: 2006
Number of pages: 783
Format: PDF
File size: 103 MB
Language: RU

In his new book, James Foster, author of a number of best-selling books, describes for the first time the methods that hackers use to attack operating systems and application programs. He gives examples of working code in CC++, Java, Perl and NASL, which illustrate methods for detecting and protecting against the most dangerous attacks.

You may also be interested in: