Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. "Exploiting Software" is loaded with examples of real attacks, attack patterns, tools, and techniques used to break software--a must-have title that may shock and educate readers.
Read More
Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. "Exploiting Software" is loaded with examples of real attacks, attack patterns, tools, and techniques used to break software--a must-have title that may shock and educate readers.
Read Less
Add this copy of Exploiting Software: How to Break Code to cart. $48.43, new condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $76.51, new condition, Sold by GridFreed rated 5.0 out of 5 stars, ships from North Las Vegas, NV, UNITED STATES, published 2004 by Addison-Wesley Professional.