"...80 per cent...anyone developing their own software may be surprised by how easily flaws can be exploited and fixed..." (PC Utilities, July 2004) "...essential for administrators who want to secure computer systems under their management..." (Computer Weekly, March 2004) "...has caused some raised eyebrows in the technical community..." (www infoworld.com, 17 March 2004)Reseña del editor:
* Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again * A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system * Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Wiley, 2004. Paperback. Estado de conservación: New. Nº de ref. de la librería P110764544683
Descripción Wiley, 2004. Paperback. Estado de conservación: New. 1. Nº de ref. de la librería DADAX0764544683