PART I

Preparation

Images  Chapter 1        Why Gray Hat Hacking? Ethics and Law

Images  Chapter 2        Programming Survival Skills

Images  Chapter 3        Next-Generation Fuzzing

Images  Chapter 4        Next-Generation Reverse Engineering

Images  Chapter 5        Software-Defined Radio