Cargando…

Chained exploits : advanced hacking attacks from start to finish /

The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Ch...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Whitaker, Andrew
Otros Autores: Evans, Keatron, Voth, Jack B.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, ©2009.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)