Table of Contents Real World Hacks................................................................................................9 Hack 1: Make Code Disappear..........................................................................10 Hack 2: Let S
Review "... I like this book. It would be a good textbook to use with a one-week Linux security workshop" -- Information Security Bulletin Product Descr iption From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating
This is an anti-hacker tool I’ve created. It’s much like Lockdown 2000. It sits on your system tray listening for incoming connections on various ports.
Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. This
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hackin
Introduction xv Chapter 1 Web Browser Security 1 A Principal Principle 2 Exploring the Browser 3 Symbiosis with the Web Application 4 Same Origin Policy 4 HTTP Headers 5 Markup Languages 5 Cascading Style Sheets 6 scr ipting 6 Document Object Model