Posted by
Mayank Sharma
The world's bestselling computer security book--fully expanded and updated.
* New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking * Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits * The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits * New wireless and RFID security tools, including multilayered encryption and gateways * All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices * Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage * VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking * Fully updated chapters on hacking the Internet user, web hacking, and securing code.
Click here to download the e-book (size:-7.79 MB)
Category:
Hacking
0
comments
Copyright ©
http://www.mayanksmansion.tk is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License
Copyright © 2011 Mayank Sharma. Powered by Blogger.
0 comments:
Post a Comment