null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

The Shellcoder's Handbook (Discovering and Exploiting Security Holes)

List Price: $52.00
SKU:
9780470080238
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
    Format:
    Paperback
    Pages:
    752
    Publisher:
    Wiley (August 20, 2007)
    Language:
    English
    Audience:
    General/trade
    ISBN-13:
    9780470080238
    Weight:
    36oz
    Dimensions:
    7.4" x 9.2" x 1.6"
    File:
    Wiley-wileyUS_2_incremental_apr21_2026-20260421.xml
    Folder:
    Wiley
    List Price:
    $52.00
    Case Pack:
    10
    As low as:
    $49.40
    Publisher Identifier:
    P-WIL
    Discount Code:
    D
    Pub Discount:
    50
    Imprint:
    Wiley
    Country of Origin:
    United States
  • Overview

    • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
    • New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
    • Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
    • The companion Web site features downloadable code files