Fuzzing for software security testing and quality assurance
Ari Takanen
0
-
Identifying Malicious Code Through Reverse Engineering
0
-
Gray Hat Python
Justin Seitz
3
-
A Guide to Kernel Exploitation: Attacking the Core
Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dubl
Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College
Massimiliano Oldani
0
-
Seven Deadliest Network Attacks
Stacy Prowell
Rob Kraus
Mike Borkin
0
-
Articles on Hacking (Computer Security), Including: Script Kiddie, Hacktivism, Hacker Manifesto, Tiger Team, the Hacker's Handbook, Great Hacker War, Timeline of Computer Security Hacker History, the Cuckoo's Egg (Book), White Hat
Hephaestus Books
0
-
Seven Deadliest Microsoft Attacks
Rob Kraus
Brian Barber
Mike Borkin
Naomi Alpern
0
-
Seven Deadliest Social Network Attacks
Carl Timm
Richard Pérez
0
-
The Theoretical Minimum: What You Need to Know to Start Doing Physics
Leonard Susskind
George Hrabovsky
3.5
-
Network Security
Owen Poole
0
-
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
Parmy Olson
3.9
-
Covert Java
Alex Kalinovsky
4
-
Design for Hackers
2.8
-
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski
4
-
Cryptonomicon
Neal Stephenson
4.24
-
The Facebook Effect
David Kirkpatrick
3.7
-
Network Security: The Complete Reference
Mark Rhodes-Ousley
Roberta Bragg
Keith Strassberg
5
-
The best of 2600
Emmanuel Goldstein
3
-
A Complete H@cker's Handbook
Paul Day
Dr. K.
0
-
The Tangled Web: A Guide to Securing Modern Web Applications
Michal Zalewski
3.33
-
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh
4.18
-
Hacking the Xbox
Andrew "Bunnie" Huang
3.75
-
The Google Story: Inside the Hottest Business, Media and Technology Success of Our Time