Monday, December 22, 2008

Hacking Exposed 5th
















18,5 Mb

The authors, a trio of security consultants for Foundstone, Inc., take the reader through a spectrum of intrusion tools and strategies. One of the biggest problems with security books is that, when you take out the OS configuration steps, most books offer little more than mundane pronouncements and recycled rules of thumb.


Download Link ;

Download Here

No comments: