Contents
Preface
Acknowledgements
1. Introduction
2. Programming
3. Exploitation
4. Networking
5. Shellcode
6. Countermeasures
7. Cryptology
8. Conclusion
Index