Wednesday, September 16, 2015

Hacking The Art Of Exploitation


CONTENTS.
  • INTRODUCTION
  • PROGRAMMING
  • EXPLOITATION
  • NETWORKING
  • SHELLCODE
  • COUNTERMEASURES
  • CRYPTOLOGY
  • CONCLUSION
Hacking The Art Of Exploitation.

No comments:

Post a Comment