Writing Security Tools and Exploits by James Foster & James C. Foster