What makes this book unique is that it presents the material in a layer by layer approach, which offers the readers a way to learn about exploits in a manner similar to how they originally learned networking. This methodology makes the book a useful tool to not only security professionals but also for networking professionals, application programmers, and others.
Read More
What makes this book unique is that it presents the material in a layer by layer approach, which offers the readers a way to learn about exploits in a manner similar to how they originally learned networking. This methodology makes the book a useful tool to not only security professionals but also for networking professionals, application programmers, and others.
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
New. Brand NEW! Orders ship same or next business day w/ free tracking. Choose Expedited shipping for fastest (2-6 business day) delivery. Satisfaction Guaranteed!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from the UK.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from the UK.