Book
The central idea of this book is that it's better for you to find the holes in your network than it is for someone else, who might use them against you, to find them. Topics include: laws of security; classes of attack; methodology; decrypting; unexpected input; session hijacking; and spoofing. «
Boeklezers.nl is a network for social reading. We help readers discover new books and authors, and bring readers in contact with each other and with writers. Read more ».
There are no reviews for this book yet.