Table of Contents:
Preface ...............................................................................................................xi
Acknowledgments ............................................................................................ xii
Introduction .......................................................................................................1
1. Programming .................................................................................................5
2. Exploitation ...................................................................................................115
3. Networking ...................................................................................................195
4. Shellcode ......................................................................................................281
5. Countermeasures............................................................................................319
6. Cryptology ....................................................................................................393
7. Conclusion ....................................................................................................451
Index ................................................................................................................455
Download or Buy Now on Amazon