Check nearby libraries
Buy this book

Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don't cover them at all. Now there's book that brings together start-to-finish information about today's most widespread chained exploits-both how to perform them and how to prevent them.
Check nearby libraries
Buy this book

Edition | Availability |
---|---|
1
Chained Exploits: Advanced Hacking Attacks from Start to Finish
2021, Pearson Education, Limited
in English
0321620615 9780321620613
|
zzzz
|
2
Chained exploits: advanced hacking attacks from start to finish
2009, Addison-Wesley
in English
0321620631 9780321620637
|
aaaa
|
3
Chained Exploits: Advanced Hacking Attacks from Start to Finish
2009, Addison-Wesley Longman, Incorporated
in English
0321631684 9780321631688
|
zzzz
|
4
Chained exploits: advanced hacking attacks from start to finish
2009, Addison-Wesley
in English
032149881X 9780321498816
|
zzzz
|
Book Details
Edition Notes
Includes index.
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created November 30, 2023
- 1 revision
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
November 30, 2023 | Created by MARC Bot | Imported from Harvard University record |