This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files
i escaped ch 10 page 250 till ch 14 page 402 , because it's was out of my study scope since im taking the course online by Sam Bowne i was so excited while reading ch14 Protection Mechanisms .. i stopped on 530 page ch19 because it wasn't on the class materials and high level knowledge requirement .. of course i will back reading the missed chapters when i have more knowledge base for it
it's not for beginners like me of course but because as i mentioned before i took it online"videos" by a good instructor.. it was more easy than reading the book only !
Well written book, covering advanced exploitation topics and ideas - despite being outdated. It also has a lot of resources for someone doing his research to study.