-
1
Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionals /
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
InfoSec career hacking sell your skillz, not your soul /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionals /
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
InfoSec career hacking sell your skillz, not your soul /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Snort 2.0 intrusion detection
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Hacking the code ASP. NET web application security /
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Buffer overflow attacks detect, exploit, prevent /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Snort 2.0 intrusion detection
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Hacking the code ASP. NET web application security /
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Buffer overflow attacks detect, exploit, prevent /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Writing security tools and exploits
Published 2006Subjects: “…Computer security Handbooks, manuals, etc.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Writing security tools and exploits
Published 2006Subjects: “…Computer security Handbooks, manuals, etc.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook