• This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New m...

Buy Now From Amazon

  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
  • Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
  • The companion Web site features downloadable code files


Similar Products

Hacking: The Art of Exploitation: The Art of ExploitationThe Hacker Playbook 2: Practical Guide To Penetration TestingThe Web Application Hacker's Handbook: Finding and Exploiting Security FlawsBlack Hat Python: Python Programming for Hackers and PentestersAssembly Language Step-by-Step: Programming with LinuxMetasploit: The Penetration Tester's GuidePractical Malware Analysis: The Hands-On Guide to Dissecting Malicious SoftwareViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers