Program Stack vulnerability [txt] Non-executable Program Stack vulnerability [txt] Strange Attractors and TCP/IP Sequence Number Analysis [link] Rainbow book series [link] Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf] Attacks on and Countermeasures for USB Hardware Token Devices [pdf] UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]Countermeasures against Buffer Overflow Attacks [pdf] Integrating Flexible Support for Security Policies into the Linux Operating System [pdf] Flaw in NTRU Signature Scheme (NSS) [pdf] Meeting Critical Security Objectived with Security-Enhanced Linux [pdf] Secure Programming with Linux and Unix [pdf] Reverse Compilation Techniques [pdf] What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf] Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]Free Books on Security Free Books on Security Free Books on Security Free Books on Security Free Books on Security
0 Comments:
Post a Comment