Secure Coding: Principles and Practices Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &... Hacker Disassembling Uncovered This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
This book is dedicated to the basics of hacking—methods of analyzing programs using a...
|Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next |