Chapter 10 Programming Survival Skills
Chapter 11 Basic Linux Exploits
Chapter 12 Advanced Linux Exploits
Chapter 13 Shellcode Strategies
Chapter 14 Writing Linux Shellcode
Chapter 16 Understanding and Detecting Content Type Attacks
Chapter 17 Web Application Security Vulnerabilities