Writing Security Tools and Exploits door James Foster & James C. Foster