Sign in

Forbidden Code

by
0.0 0 ratings

About this book

Dieses Buch beschreibt verschiedene Methoden, wie man in Computersysteme einbrechen kann. Es besteht hauptsächlich aus 3 Teilen: Programmierung (Buffer-Overflows, Format-Strings, ...), Netzwerke (Port-Scanning, Denial-of-Service, ...) und Kryptologie (Verschlüsselungsmethoden, Passwörter cracken, ...)

Details

OpenLibrary OL15712977W
Source OpenLibrary

Community Reviews

Sign in to rate and review this book

Sign in

No reviews yet. The silence is deafening. Be the main character and write one.

Readers also enjoyed