Hope this Book will give you some idea. http://sodaphish.com/files/ebks/try2innovate.com/downloads/E-books/Hacking/Hacking%20Exposed-%20Network%20Security%20Secrets%20and%20Solutions%20(MCGraw-Hill-2001).pdf
or http://hates.home.anadolu.edu.tr/books/Computer/Hacking/Hacking%20Exposed%20-%20Network%20Security%20Secrets%20&%20Solutions,%202nd%20Edition%20(2001).pdf PPT: www.cs.cmu.edu/~srini/15-441/S05/lectures/26-security2.*ppt<http://www.cs.cmu.edu/~srini/15-441/S05/lectures/26-security2.ppt> * www.cs.cmu.edu/~srini/15-441/F02/lectures/lec21-security.*ppt<http://www.cs.cmu.edu/~srini/15-441/F02/lectures/lec21-security.ppt> * Regards, 0xN41K On Sun, Jun 6, 2010 at 2:58 PM, nittbdb <[email protected]> wrote: > pls share it................ > > -- > You received this message because you are subscribed to the Google Groups > "nforceit" group. > To post to this group, send an email to [email protected]. > To unsubscribe from this group, send email to > [email protected]<nforceit%[email protected]> > . > For more options, visit this group at > http://groups.google.com/group/nforceit?hl=en-GB. > > -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
