Hacking The Art of Exploitation – 2nd Edition

Course Layout

Chapter 1: Introduction
Chapter 2: Programming
Chapter 3: Exploitation
Chapter 4: Networking
Chapter 5: Shellcode
Chapter 6: Countermeasures
Chapter 7: Cryptology
Chapter 8: Conclusion

Categories: Ebooks

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *