Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented...
przeczytaj całość
Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.
ukryj opis
Recenzja