hit counter code

Hacking: The Art of Exploitation, 2nd Edition

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to…

Hacking 2nd Edition

ISBN 10 : 9781593271442
ISBN 13 : 1593271441

An introduction to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, network security, cryptographic atta..

Puzzles For Hackers

ISBN 10 : 9781931769457
ISBN 13 : 1931769451

These puzzles and mind-benders serve as a way to train logic and help developers, hackers, and system administrators discover unconventional solutions to common IT problems. Users ..

Web Commerce Security

ISBN 10 : 1118098919
ISBN 13 : 9781118098912

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's o..

Building Internet Firewalls

ISBN 10 : 0596551886
ISBN 13 : 9780596551889

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, of..

The Secret Of Hacking

ISBN 10 : 1475092415
ISBN 13 : 9781475092417

Master the Professional Ethical Hacking & IT SecurityThe Secret of Hacking KIT" which Contains Ethical Hacking & Information SecuritySecret Information unknown to 99.9% of the worl..

Information Security The Complete Reference Second Edition

ISBN 10 : 9780071784368
ISBN 13 : 0071784365

Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on..