文档介绍:SYNtRESS
/"/4I Alt
4 FREE BOOKLETS J4
YOUR SOLUTIONS MEMBERSHIP / FREE I
E-BOOKLETS /-
Sockets,
Shellcode,
Porting & Coding
REVERSE ENGINEERING EXPLOITS AND TOOL
CODING FOR SECORITY PROFESSIONALS
Elite Programming Techniques Demystified
• Port Public Exploits to Windows, Linux, UNIX, and Mac OS
• Use Reverse Engineering to Perform Zero-Day Exploit Forensics
• Implement a Previously Undocumented Nmap-Style Input Function
James C. Foster FOREWORD
BY STUART McCLURE
with Mike Price
LEAD AUTHOR OF HACKING EXPOSED
Register for Free Membership to
Over the last few years, Syngress has published many best-selling and
critically acclaimed books, including Tom Shinder's Configuring ISA
Server 2000, Brian Caswell and Jay Beale's Snort Intrusion
Detection, and Angela Orebaugh and Gilbert Ramirez's Ethereal
Packet Sniffing. One of the reasons for the ess of these books has
been our unique solutions@ program. Through this
site, we've been able to provide readers a real time extension to the
printed book.
As a registered owner of this book, you will qualify for free access to
our members-only solutions@ program. Once you have
registered, you will enjoy several benefits, including:
• Four downloadable e-booklets on topics related to the book.
Each booklet is approximately 20-30 pages in Adobe PDF
format. They have been selected by our editors from other
best-selling Syngress books as providing topic coverage that
is directly related to the coverage in this book.
• prehensive FAQ page that consolidates all of the key
points of this book into an easy to search Web page, pro•
viding you with the concise, easy-to-access data you need to
perform your job.
• A "From the Author" Forum that allows the authors of this
book to post timely updates and links to related sites, or
additional topic coverage that may have been requested by
readers.
Just visit us at utions