Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Writing Security Tools and ExploitsWriting Security Tools and Exploits

Writing Security Tools and Exploits2005

James C. Foster

About this book

Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts.

Details

First published
2005
OL Work ID
OL2694764W

Find this book

HardcoverOpen Library
Book data from Open Library. Cover images courtesy of Open Library.