Check nearby libraries
Buy this book

Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don't cover them at all. Now there's book that brings together start-to-finish information about today's most widespread chained exploits-both how to perform them and how to prevent them.
Check nearby libraries
Buy this book

Edition | Availability |
---|---|
1
Chained Exploits: Advanced Hacking Attacks from Start to Finish
2021, Pearson Education, Limited
in English
0321620615 9780321620613
|
aaaa
|
2
Chained Exploits: Advanced Hacking Attacks from Start to Finish
2009, Addison-Wesley Longman, Incorporated
in English
0321631684 9780321631688
|
zzzz
|
3
Chained exploits: advanced hacking attacks from start to finish
2009, Addison-Wesley
in English
032149881X 9780321498816
|
zzzz
|
4
Chained exploits: advanced hacking attacks from start to finish
2009, Addison-Wesley
in English
0321620631 9780321620637
|
zzzz
|
Community Reviews (0)
History
- Created December 26, 2021
- 1 revision
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
December 26, 2021 | Created by ImportBot | Imported from Better World Books record |