Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. "Exploiting Software" is loaded with examples of real attacks, attack patterns, tools, and techniques used to break software--a must-have title that may shock and educate readers.
Read More
Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. "Exploiting Software" is loaded with examples of real attacks, attack patterns, tools, and techniques used to break software--a must-have title that may shock and educate readers.
Read Less
Add this copy of Exploiting Software: How to Break Code to cart. $2.36, good condition, Sold by The Maryland Book Bank rated 5.0 out of 5 stars, ships from baltimore, MD, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $2.36, good condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Brownstown, MI, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code (Addison-Wesley to cart. $2.48, good condition, Sold by BookHolders rated 5.0 out of 5 stars, ships from Gambrills, MD, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software How to Break Code to cart. $13.10, good condition, Sold by TextbookRush rated 4.0 out of 5 stars, ships from Grandview Hts, OH, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $26.96, very good condition, Sold by Wonder Book - Member ABAA/ILAB rated 5.0 out of 5 stars, ships from Frederick, MD, UNITED STATES, published 2004 by Addison-Wesley Professional.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very Good. Signed Copy Collectible-Very Good. Inscribed by author on half title page. (computer software, testing, computer security, hackers, cyberterrorism )
Add this copy of Exploiting Software: How to Break Code to cart. $30.58, good condition, Sold by Book Words rated 3.0 out of 5 stars, ships from Midland Park, NJ, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $31.64, good condition, Sold by TEXTSHUB rated 5.0 out of 5 stars, ships from Franklin Lakes, NJ, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $36.16, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Newport Coast, CA, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $75.64, new condition, Sold by GridFreed rated 4.0 out of 5 stars, ships from North Las Vegas, NV, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $87.88, new condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Newport Coast, CA, UNITED STATES, published 2004 by Addison-Wesley Professional.