Friends, we have received many orders, thank you! We are trying to process and send them as quickly as possible. The order processing time may increase.
Don't hope to get rid of books (Umberto Eco)
+371 27000041, +371 27000045
(on working days 9:00-17:00 latvian)
+371 27000041
+371 27000045

(on working days 10:00-17:00)
Discount!

Hacking: The Art of Exploitation

39.99 €
31.99 €
In stock
Hacking: The Art of Exploitation
39.99 €
31.99 €
In basket
Every programmer is essentially a hacker. After all, hacking originally referred to the search for a skillful and non-obvious solution. Understanding programming principles helps to find vulnerabilities, and vulnerability detection skills help to create programs, so many hackers do both at the same time. There are interesting unconventional moves in both techniques for writing elegant programs and techniques for finding weaknesses.
Where to start. To overwrite memory with buffer overflows, access a remote server and intercept connections you will have to program in C and assembly language, use shell code and CPU registers, learn about networking and encryption and much more. As much as we want to believe in miracles, the software and computer networks on which our daily lives depend have vulnerabilities. A world without hackers is a world without curiosity and innovation. John Erickson
See also:

You might be interested:

Разработка требований  к программному обеспечению
Information technology
Development of software requirements
Vigers Carl, Beatty Joy
29.99 €
In basket
Совершенный код. Практическое руководство по разработке программного обеспечения
Information technology
Code Complete: A Practical Guide to Software Development
McConnell Steve
49.99 €
In basket
Алгоритмы. Руководство по разработке
Information technology
Algorithms: Development Guide
Skiena Stephen
39.99 €
In basket