Home Advanced Search

Advanced Search - Page 1

Writing Security Tools and Exploits
  • PDF
  • English
  • Year: 2006
  • Author: James C. Foster, Vincent T. Liu
The Enlightened Judgments: Ch'ing-ming Chi: The Sung Dynasty Collection
  • PDF
  • English
  • Year: 1999
  • Author: Brian E. McKnight, James T. C. Liu
Buffer Overflow Attacks: Detect, Exploit, Prevent
  • PDF
  • English
  • Year: 2005
  • Author: James C. Foster
Programmer's Ultimate Security DeskRef
  • PDF
  • English
  • Year: 2004
  • Author: James C. Foster
Programmer’s Ultimate Security Desk Reference
  • PDF
  • English
  • Year: 2004
  • Author: James C. Foster
Sockets, Shellcode, Porting, and Coding
  • PDF
  • English
  • Year: 2005
  • Author: James C Foster