HomeGroupsTalkExploreZeitgeist
Search Site
This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

The Shellcoder's Handbook: Discovering…
Loading...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes (edition 2004)

by Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren2 more, Neel Mehta, Riley Hassell

MembersReviewsPopularityAverage ratingConversations
213None111,132 (3.9)None
This much-anticipated revision, written by the ultimate groupof top security experts in the world, features 40 percent newcontent on how to find security holes in any operating system orapplication New material addresses the many new exploitation techniquesthat have been discovered since the first edition, includingattacking "unbreakable" software packages such as McAfee'sEntercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information onexploiting Cisco's IOS, with content that has never before beenexplored The companion Web site features downloadable code files… (more)
Member:JudisR
Title:The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Authors:Jack Koziol
Other authors:David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta1 more, Riley Hassell
Info:Wiley (2004), Paperback, 644 pages
Collections:Your library
Rating:
Tags:None

Work Information

The Shellcoder's Handbook: Discovering and Exploiting Security Holes by Jack Koziol

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Original language
Canonical DDC/MDS
Canonical LCC

References to this work on external resources.

Wikipedia in English (3)

This much-anticipated revision, written by the ultimate groupof top security experts in the world, features 40 percent newcontent on how to find security holes in any operating system orapplication New material addresses the many new exploitation techniquesthat have been discovered since the first edition, includingattacking "unbreakable" software packages such as McAfee'sEntercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information onexploiting Cisco's IOS, with content that has never before beenexplored The companion Web site features downloadable code files

No library descriptions found.

Book description
Haiku summary

Popular covers

Quick Links

Rating

Average: (3.9)
0.5
1 1
1.5
2
2.5
3 2
3.5 1
4 7
4.5
5 4

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 180,449,257 books! | Top bar: Always visible