Related Books
Language: en
Pages: 384
Pages: 384
Type: BOOK - Published: 2015-08-19 - Publisher: John Wiley & Sons
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus
Language: en
Pages: 770
Pages: 770
Type: BOOK - Published: 2011-03-16 - Publisher: John Wiley & Sons
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-w
Language: en
Pages: 386
Pages: 386
Type: BOOK - Published: 2011-03-21 - Publisher: John Wiley & Sons
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-
Language: en
Pages: 583
Pages: 583
Type: BOOK - Published: 2014-03-26 - Publisher: John Wiley & Sons
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the sma
Language: en
Pages: 531
Pages: 531
Type: BOOK - Published: 2014-06-14 - Publisher: No Starch Press
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide