In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.
Read More
In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
New. 2008. 2nd ed. Paperback. Deals with computers/software. Num Pages: 472 pages, black & white illustrations. BIC Classification: URH. Category: (G) General (US: Trade). Dimension: 238 x 179 x 34. Weight in Grams: 970. The Art of Exploitation. 472 pages, illustrations. Deals with computers/software. Cateogry: (G) General (US: Trade). BIC Classification: URH. Dimension: 238 x 179 x 34. Weight: 952......We ship daily from our Bookshop.