Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Forbidden CodeForbidden Code

Forbidden Code

Jon Erickson

About this book

Dieses Buch beschreibt verschiedene Methoden, wie man in Computersysteme einbrechen kann. Es besteht hauptsächlich aus 3 Teilen: Programmierung (Buffer-Overflows, Format-Strings, ...), Netzwerke (Port-Scanning, Denial-of-Service, ...) und Kryptologie (Verschlüsselungsmethoden, Passwörter cracken, ...)

Details

OL Work ID
OL15712977W

Subjects

computer securityhackernetworkscomputerNetzwerkComputersicherheit

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.