Chris Anley , John Heasman , Felix Lindner , Gerardo Richarte
John Wiley | ISBN: 9780764544682 | 644 pages | PDF(RAR) | 3.1MB
* Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again
* A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system
* Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases)
* Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
Download: http://rapidshare.com/files/17...llow noopener noreferrer">