Don't hope to get rid of books (Umberto Eco)
+371 27000041, +371 27000045
(on working days 9:00-17:00 latvian)
+371 27000041
+371 27000045

(on working days 10:00-17:00)
Discount!

Hacking: The Art of Exploit

39.99 €
31.99 €
In stock
Hacking: The Art of Exploit
39.99 €
31.99 €
In basket
Every programmer is essentially a hacker. After all, hacking originally referred to the search for a skillful and non-obvious solution. Understanding programming principles helps to find vulnerabilities, and vulnerability detection skills help to create programs, so many hackers do both at the same time. There are interesting unconventional moves in both techniques for writing elegant programs and techniques for finding weaknesses.
Where to start. To overwrite memory with buffer overflows, access a remote server and intercept connections you will have to program in C and assembly language, use shell code and CPU registers, learn about networking and encryption and much more. As much as we want to believe in miracles, the software and computer networks on which our daily lives depend have vulnerabilities. A world without hackers is a world without curiosity and innovation. John Erickson
See also:

You might be interested:

Переход в облако. Практическое руководство по организации облачных вычислений для ученых и IT-специалистов
Information technology
Moving to the Cloud: A Practical Guide to Cloud Computing for Scientists and IT Professionals
Anielle Juan, Montes Diego, Iglesias Javier Rodeiro
14.99 €
In basket
Совершенный код. Практическое руководство по разработке программного обеспечения
Information technology
Code Complete: A Practical Guide to Software Development
McConnell Steve
49.99 €
In basket
Алгоритмы. Руководство по разработке
Information technology
Algorithms. Development Guide
Skiena Stephen
39.99 €
In basket
Excel 2019 Библия пользователя
Information technology
Excel 2019 User Bible
Alexander Michael, Kusleika Richard, Wokenbach John
99.99 €
In basket