Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. This second edition teaches about those topics, including: the politics; laws of security; classes of attack; methodology; diffing; decrypting; brute force; unexpected input; buffer overrun; sniffing; session hijacking; spoofing; server holes; client holes; trojans and viruses; reporting security problems; and choosing secure systems. The central idea of this book is that it’s better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. This second edition teaches about those topics, including: the politics; laws of security; classes of attack; methodology; diffing; decrypting; brute force; unexpected input; buffer overrun; sniffing; session hijacking; spoofing; server holes; client holes; trojans and viruses; reporting security problems; and choosing secure systems. The central idea of this book is that it’s better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you.