Check nearby libraries
Buy this book
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Computer Technology, Nonfiction, Computer securityShowing 1 featured edition. View all 1 editions?
Edition | Availability |
---|---|
1 |
aaaa
Libraries near you:
WorldCat
|
Book Details
Edition Notes
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created July 1, 2010
- 7 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
September 16, 2021 | Edited by ImportBot | import existing book |
August 20, 2020 | Edited by ImportBot | import existing book |
July 7, 2019 | Edited by MARC Bot | import existing book |
July 7, 2019 | Edited by MARC Bot | import existing book |
July 1, 2010 | Created by ImportBot | Imported from marc_overdrive MARC record |