by Greg Hoglund (Author), Greg Hoglund (Author)
Using attack patterns, real code, and example exploits, students learn techniques that are used by real malicious hackers against software. The author team show to break code-if students want to protect software from attack, they must first learn how real attacks are really carried out.
Format: Illustrated
Pages: 508
Edition: 1
Publisher: Addison-Wesley Professional
Published: 17 Feb 2004
ISBN 10: 0201786958
ISBN 13: 9780201786958