Search ResultsElectronic Resources 
by
Gregg, Michael (Michael C.)
ScienceDirect http://www.sciencedirect.com/science/book/9781597491099
Format:
Excerpt:
Using Snort to detect a buffer overflow attack Reverse engineering code Using the Exploitation Framework

Select an Action





