Uncovering the development of the hacking toolset under Linux,
this book teaches programmers the methodology behind hacker
programming techniques so that they can think like an attacker
when developing a defense. Analyses and cutting-edge programming
are provided of aspects of each hacking item and its source
code—including ping and traceroute utilities, viruses, worms,
Trojans, backdoors, exploits (locals and remotes), scanners... more...