Chained Exploits Advanced Hacking Attacks from Start to Finish

The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are f...

Descripción completa

Detalles Bibliográficos
Otros Autores: Whitaker, Andrew, author (author), Evans, Keatron, author, Voth, Jack, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Addison-Wesley Professional 2009.
Edición:1st edition
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627332706719

Ejemplares similares