The authors--including Sandeep Phadke and Milind Borate--draw on their extensive backgrounds and two years of research to analyze the undocumented NT API calls, thus shedding light on how NT works and revealing its security holes and risks. CD includes all of the scripts, code samples, and executables the authors use in the book.
Read More
The authors--including Sandeep Phadke and Milind Borate--draw on their extensive backgrounds and two years of research to analyze the undocumented NT API calls, thus shedding light on how NT works and revealing its security holes and risks. CD includes all of the scripts, code samples, and executables the authors use in the book.
Read Less