Skip to content
Paperback Writing Security Tools and Exploits Book

ISBN: 1597499978

ISBN13: 9781597499972

Writing Security Tools and Exploits

Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software... This description may be from another edition of this product.

Recommended

Format: Paperback

Temporarily Unavailable

2 people are interested in this title.

We receive fewer than 1 copy every 6 months.

Customer Reviews

2 ratings

Great Book Examines Security Exploitation

If you are an IT professional that needs to learn more about security exploitation and how people can get in and abuse your system, this is a great book for this purpose. Very technical book, not for beginners!! If you work in IT and want to learn about how to keep the hackers out, this text is a worthwhile read for you **** RECOMMENDED

Excellent Book, but disappointing. . .

Would like just to tell how good this book is (and it is indeed), but I am very disappointed by the fact that no CD is actually included and the companion Web site doesn't seem to exist either. !! The Editorial review claims: "The book is accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0." Well, sorrily, that's NOT true. Perhaps this confusion is due to changes resulting from the merge of Syngress with ORA, but still not fair with buyers. Otherwise, if you, like me, are a researcher (or just interested) in the "secure code" area, then buy the book in spite of all. By far it is the very best book written about these issues. Best in the sense of most useful. Well designed organized, with in deep study of vulnerabilities and associated exploit codes. Shellcode is explained in a rich and fresh way and the Why, How and When of shellcode are explained under an integrated framework. NASL and MSF are explained and used in detailed and useful examples, and IMHO, this book presents the most easy, clear and condensed explanation about the Race Conditions, Format Strings, and Buffer Overflows problems I ever read yet. Warning: Not an entry level book. You need to be familiar with several software and hardware architecture concepts to obtain full benefits from it.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured