Chained Exploits Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are f...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Addison-Wesley Professional
2009.
|
Edición: | 1st edition |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627332706719 |