Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS ...
Read More
Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Used books are NOT guaranteed to contain components and/or supplements such as: Access Codes or working CD's/DVD's! ! Expedited shipping 1-3 business days;
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very Good Condition. Text appears to be clean. Cover has some wear and corner bumps. Spine is in very good condition. Quantity Available: 1. Shipped Weight: Under 1 kilo. Category: Computers & Internet; ISBN: 0764544683. ISBN/EAN: 9780764544682. Pictures of this item not already displayed here available upon request. Inventory No: 1561047665.