Network Security Tools: Writing, Hacking, and Modifying Security Tools
| Chapter 7: Fun with Linux Kernel Modules Chapter 8: Developing Web Assessment Tools and Scripts Chapter 9: Automated Exploit Tools Chapter 10: Writing Network Sniffers Chapter 11: Writing Packet-Injection Tools
|