294 12 5MB
English Pages 600 Year 2003
Report DMCA / Copyright
DOWNLOAD CHM FILE
Text shows how to analyze programs without its source code, using a debugger and a disassembler. Covers hacking methods
462 26 5MB Read more
370 10 5MB Read more
568 120 2MB Read more
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks
404 73 4MB Read more
A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written
332 99 555KB Read more
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained i
348 60 12MB Read more
We all need more hours in the day, as we spend more time than ever working, studying and caring. So what if we could rec
305 88 6MB Read more
Gave as a gift to my husband and I have a hard time pulling him away from the computer now! He's found this to be i
392 85 19MB Read more
Confidence is a powerful force. When we have it, we feel we can take on the world; when we don't, even the smallest
339 47 3MB Read more
For well over a decade, Franchising & Licensing has been the standard reference for industry executives, consultants
458 23 2MB Read more