miércoles, 8 de agosto de 2007

Exploiting software, how to break code

How does software break? How do attackers make software break on purpose? Why arefirewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?What tools can be used to break software? This book provides the answers.Exploiting Software is loaded with examples of real attacks, attack patterns, tools, andtechniques used by bad guys to break software. If you want to protect your software fromattack, you must first learn how real attacks are really carried out.

Hacker's Challenge

Hacker’s Challenge will definitely challenge even the most technically astute I.T.security pros with its ‘ripped from the headlines’ incident response scenarios. Thesebased-on-real-life vignettes from a diverse field of experienced contributors make forpage-turning drama, and the reams of authentic log data will test the analytical skillsof anyone sharp enough to get to the bottom of these puzzling tableaus.”