Comments: Moderate cover and page wear from being handled and read. Accessories or dust jacket may be missing. Could be an ex-library copy that will have the stickers and or marking of the library. Some textual or margin notes and possibly contain highlighting.
30-day money back guarantee
Publisher: Wiley & Sons, Incorporated, John
Koziol, Jack, Litchfield, David, Aitel, Dave
Uncover, exploit, and close security holes in any software or operating system Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring. The Shellcoder's Handbook is written by a unique author team, consisting of "white hat" corporate security experts and underground hacker-cracker types, who are the most respected contributors to Bugtraq, a vulnerability tracking mailing list. They take you from introductory-level exploitation and exposing vulnerabilities in binaries to advanced content on kernel overflows. In addition, they provide you with advanced techniques to close new security holes that are not yet known to the public but could cause devastating consequences. With all this information, you'll be able to develop your own discovery process and quickly determine whether a security hole is truly exploitable. The methods discussed will also dramatically improve your penetration testing skills in order to achieve a "100% Penetration Rate Guaranteed." The Shellcoder's Handbook shows you how to: Find out where security holes come from and how to close them so they never occur again Pinpoint vulnerabilities in popular operating systems (including Windows , Linux , and SolarisTM) and applications (including MS SQL Server and Oracle databases) Write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken Deal with discovered vulnerabilities using previously unpublished advanced exploits and techniquesKoziol, Jack is the author of 'Shellcoder's Handbook Discovering and Exploiting Security Holes' with ISBN 9780764544682 and ISBN 0764544683.
With our dedicated customer support team, 30-day no-questions-asked return policy, and our price match guarantee, you can rest easy knowing that we're doing everything we can to save you time, money, and stress.
Book condition guidelines
New (perfect condition)
Pages are clean and are not marked by notes, highlighting or fold.
Like new (excellent condition)
Pages are clean and are not marked by notes, highlighting or folds.
Very good (good condition)
Pages are intact and may have minimal notes and/or highlighting or folds.
Good (clean condition)
All pages and the cover is intact. The spine may show signs of wear. Pages include notes and/or highlighting.
Acceptable (readable condition)
All pages and the cover is intact. Pages include considerable notes in pen or highlighter, but the text is not obscured.
How do rentals work?
Save up to 90% on the largest selection of textbook rentals in the business. We have the lowest prices - guaranteed.
Choose between standard or expedited shipping to make sure that your textbooks arrive in time for class.
Return for free!
When your books are due, just pack them up and ship them back. And don't worry about shipping - it's absolutely free!