Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur againA unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating systemShows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
i escaped ch 10 page 250 till ch 14 page 402 , because it's was out of my study scope since im taking the course online by Sam Bowne i was so excited while reading ch14 Protection Mechanisms .. i stopped on 530 page ch19 because it wasn't on the class materials and high level knowledge requirement .. of course i will back reading the missed chapters when i have more knowledge base for it
it's not for beginners like me of course but because as i mentioned before i took it online"videos" by a good instructor.. it was more easy than reading the book only !
Well written book, covering advanced exploitation topics and ideas - despite being outdated. It also has a lot of resources for someone doing his research to study.