We use cookies to provide essential features and services. By using our website you agree to our use of cookies .

×

Warehouse Stock Clearance Sale

Grab a bargain today!


Hacker Linux Uncovered
By

Rating

Product Description
Product Details

Table of Contents

1. Who Are Hackers? 2. What We Will Be Discussing 3. What We Will Need 4. Getting Acquainted with Basic Hacking Methods 5. How the Debugger Works 6. Processing Exceptions in Real-Time and Safe Modes 7. How Hackers Hack Programs 8. How to Protect Your Programs 9. Ways of Fighting Disassemblers 10. Self-Modifying Code in Modern Operating Systems 11. Executing Code in the Stack; Pitfalls of Movable Code 12. Optimizing Compilers 13. Self-Modifying Code as a Means of Protecting Applications 14. New Methods of Protection

About the Author

Michael Flenov

Ask a Question About this Product More...
 
Look for similar items by category
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top