An edition of Chained exploits (2009)

Chained Exploits

Advanced Hacking Attacks from Start to Finish

Chained Exploits
Andrew Whitaker, Andrew Whitak ...
Locate

My Reading Lists:

Create a new list


Buy this book

Last edited by ImportBot
December 26, 2021 | History
An edition of Chained exploits (2009)

Chained Exploits

Advanced Hacking Attacks from Start to Finish

Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don't cover them at all. Now there's book that brings together start-to-finish information about today's most widespread chained exploits-both how to perform them and how to prevent them.

Publish Date
Language
English

Buy this book

Edition Availability
Cover of: Chained Exploits
Chained Exploits: Advanced Hacking Attacks from Start to Finish
2021, Pearson Education, Limited
in English
Cover of: Chained Exploits
Chained Exploits: Advanced Hacking Attacks from Start to Finish
2009, Addison-Wesley Longman, Incorporated
in English
Cover of: Chained exploits
Chained exploits: advanced hacking attacks from start to finish
2009, Addison-Wesley
in English
Cover of: Chained exploits
Chained exploits: advanced hacking attacks from start to finish
2009, Addison-Wesley
in English

Add another edition?

Book Details


Edition Identifiers

Open Library
OL35881673M
ISBN 13
9780321620613

Work Identifiers

Work ID
OL2921815W

Source records

Better World Books record

Community Reviews (0)

No community reviews have been submitted for this work.

Lists

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
December 26, 2021 Created by ImportBot Imported from Better World Books record