This book provides both theoretical and practical insights into ethical hacking techniques. It presents many possible attacks with short source code samples which may help individual to get an idea about exploitation mechanisms used by black hat hackers--
Piracy-free
Assured Quality
Secure Transactions
*COD & Shipping Charges may apply on certain items.