Your search returned 5 results.

Sort
Results
1.
Image from Google Jackets
Programmers ultimate security deskref: your programming security encyclopedia James C. Foster, Steven C. Foster by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FOS.

2.
Image from Google Jackets
Writing security tools and exploits James C Foster ; Vincent T Liu by
Publication details: Canada Syngress c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FOS.

3.
Image from Google Jackets
Buffer overflow attacks : detect, exploit, prevent James C. Foster....[et...al] by
Publication details: Rockland, MA Syngress Publishing c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 FOS.

4.
Image from Google Jackets
Writing security tools and exploits James C Foster ; Vincent T Liu by
Publication details: Canada Syngress c2006
Availability: No items available.

5.
Image from Google Jackets
Sockets, Shellcode, Porting & Coding : Reverse Engineering Exploits And Tool Coding For Security Professionals James C. Foster by Language: English
Publication details: Rockland Syngress Pub. 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FOS.

Find us on the map