Engineering & Transportation
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Code Hacking: A Developer's Guide To Network Security (Charles River Media Networking/Security) Paperback – May 1, 2004

ISBN-13: 061-9587031491 ISBN-10: 1584503149 Edition: 1st

11 New from $19.99 16 Used from $10.96
Amazon Price New from Used from
Paperback
"Please retry"
$19.99 $10.96
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Editorial Reviews

About the Author

Richard Conway (Essex, England) is a freelance consultant who has held many Technical Architect/Lead Developer positions. He has contributed to numerous books and articles, including C# Class Design Handbook, ASP.NET Security, and Professional Windows GUI Programming.

Julian Cordingley (Surrey, England) is a full time consultant specializing in security and distributed applications. He currently heads up the IT Security for the UK government's Office of e-Envoy, and advises on Technical Architecture issues as well.
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Charles River Media Networking/Security
  • Paperback: 386 pages
  • Publisher: Charles River Media; 1 edition (May 2004)
  • Language: English
  • ISBN-10: 1584503149
  • ISBN-13: 978-1584503149
  • Product Dimensions: 1.2 x 7.5 x 9.5 inches
  • Shipping Weight: 1.8 pounds
  • Average Customer Review: 3.0 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Best Sellers Rank: #3,110,547 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

3.0 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
1
See both customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

3 of 5 people found the following review helpful By Midwest Book Review on August 7, 2004
Format: Paperback
The collaboration of freelance computer consultant Richard Conway and security and distributed applications consultant Julian Cordingley, Code Hacking: A Developer's Guide To Network Security is a guidebook that teaches developers basic hacking techniques and hacker methodologies and thought processes, so that developers can write code that more effectively resists hacking as well as how to write network security test harnesses for application and infrastructure. Scanners, sniffers, and common exploits are also covered in this in-depth guide that uses the languages of C#, C++, and Java to present and explain its lessons. An accompanying CD-ROM contains a custom security scanner written in C#. Highly recommended for aspiring and skilled developer's in today's modern age of cybercrime.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 2 people found the following review helpful By Marco De Vivo on January 5, 2006
Format: Paperback Verified Purchase
Had this book been published 5 years ago, then it would have been considered OK (just ok). Today, this is only an anachronic, elementary and overall useless book.

Currently I am researching in the secure code area and got a lot of related paper and books. By no means this book could be considered as a valid contender (alternative). It only provides "yet another" useless collection of naive and dated (loosely explained) attacks.

If really interested in this area, try Mr. VIEGAS' books. A bit repetitive (same issues discussed again in each book) but very helpful for understanding, classifying, preventing and detecting vulnerable codes.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again