Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Teaches users how to select passwords that always meet complexity requirements. This book examines the password problem from the perspective of the administrator trying to secure their network.
Contains information of dedicated exploit, vulnerability, and tool code along with corresponding instruction. This book also includes a CD which contains both commented and uncommented versions of the source code examples presented throughout, along with a copy of the author-developed Hacker Code Library v1.0.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.