Whitaker, A., Evans, K., & Voth, J. (2009). Chained Exploits: Advanced Hacking Attacks from Start to Finish (1st edition.). Addison-Wesley Professional.
Cita Chicago Style (17a ed.)Whitaker, Andrew, Keatron Evans, y Jack Voth. Chained Exploits: Advanced Hacking Attacks from Start to Finish. 1st edition. Addison-Wesley Professional, 2009.
Cita MLA (9a ed.)Whitaker, Andrew, et al. Chained Exploits: Advanced Hacking Attacks from Start to Finish. 1st edition. Addison-Wesley Professional, 2009.
Precaución: Estas citas no son 100% exactas.