Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Buy

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.

(HTML tags aren't allowed.)

Modeling and Control of a Large Nuclear Reactor: A Three-Time-Scale Approach (Lecture Notes in Control and Information Sciences)
Modeling and Control of a Large Nuclear Reactor: A Three-Time-Scale Approach (Lecture Notes in Control and Information Sciences)

Control analysis and design of large nuclear reactors requires a suitable mathematical model representing the steady state and dynamic behavior of the reactor with reasonable accuracy. This task is, however, quite challenging because of several complex dynamic phenomena existing in a reactor. Quite often, the models developed would be of...

The Essential Guide to Computer Data Storage: From Floppy to DVD
The Essential Guide to Computer Data Storage: From Floppy to DVD

A world without data storage is like a mankind without memory. Thanks to various information storage methods developed in the last 22,000 years, we are able to document our history, to learn from each other's experience, and, ultimately, to create the world as it is today.

The future of computing is...

Google Web Toolkit Applications
Google Web Toolkit Applications
Accelerate and Simplify Ajax Development with Google Web Toolkit


Get the edge you need to deliver exceptional user experiences with Google™ Web Toolkit Applications, a guidebook that provides web developers with core information and...


Learning NGUI for Unity
Learning NGUI for Unity

Leverage the power of NGUI for Unity to create stunning mobile and PC games and user interfaces

About This Book

  • Get to grips with NGUI for both PC and mobile devices
  • Create fully functional 2D and 3D cross-platform user interfaces
  • A step-by-step guide, full of examples to...
Refactoring to Agility
Refactoring to Agility

Agile methodologies, such as XP, Scrum, Crystal, and Lean Software Development enable development organizations to deliver higher-quality software far more rapidly. However, for the "non-agile" development organization, transitioning to agility is an enormous leap, requiring radically new skills and presenting profound...

Distances and Similarities in Intuitionistic Fuzzy Sets (Studies in Fuzziness and Soft Computing)
Distances and Similarities in Intuitionistic Fuzzy Sets (Studies in Fuzziness and Soft Computing)

This book presents the state-of-the-art in theory and practice regarding similarity and distance measures for intuitionistic fuzzy sets. Quantifying similarity and distances is crucial for many applications, e.g. data mining, machine learning, decision making, and control. The work provides readers with a comprehensive set of theoretical...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy