A practical introduction to the art of ethical hacking for professionals and security analysts addresses a range of moral and legal issues regarding hacking, offers detailed instructions--complete with line-by-line code samples, countermeasures, and moral disclosure procedures--explains how to identify security holes, examines a variety of useful tools, and reveals the best ways to trap and destroy stealth worms, viruses, rootkits, adware, malware, and more. Original. (Intermediate)
toryah1988 has added Harry Potter And The Order Of The Phoenix to their read list.
toryah1988 has added Harry Potter And The Goblet Of Fire to their read list.
toryah1988 has added Atonement to their read list.
toryah1988 has added New Moon (The Twilight Saga) to their read list.
Monica has added The Da Vinci Code (Large Print) to their wish list.