Chained Exploits

Available
0
StarStarStarStarStar
0Reviews

The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well an...

Read more
E-book
epub
Price
0.01 £

The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well an...

Read more
Follow the Author

Options

  • Formats: epub
  • ISBN: 9780321631688
  • Publication Date: 27 Feb 2009
  • Publisher: Pearson Education
  • Product language: English
  • Drm Setting: DRM