A Buffer Overflow Study
Attacks & Defenses (2002)
The Hacker Playbook: Practical Guide To Penetration Testing
Kim, Peter
MITLockGuide
Unknown
Silent Weapons for Quiet Wars
How to Hack Computers: how to hack computers, hacking for beginners, ...
Joel Tope