Chained exploits : advanced hacking attacks from start to finish /
The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Ch...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Whitaker, Andrew |
Otros Autores: | Evans, Keatron, Voth, Jack B. |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, N.J. :
Addison-Wesley,
©2009.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Hacking : the next generation /
por: Dhanjani, Nitesh
Publicado: (2009) -
Hacking : the art of exploitation /
por: Erickson, Jon, 1977-
Publicado: (2008) -
Hacking : the art of exploitation /
por: Erickson, Jon, 1977-
Publicado: (2008) -
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures /
por: Contos, Brian T.
Publicado: (2006) -
Hacking for Dummies.
por: Beaver, Kevin
Publicado: (2018)