* Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again * A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system * Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
- ISBN10 6610935475
- ISBN13 9786610935475
- Publish Date 1 January 2007 (first published 2 April 2004)
- Publish Status Active
- Out of Print 21 August 2012
- Publish Country US
- Imprint John Wiley & Sons
- Format eBook
- Pages 743
- Language English