Chained Exploits: Advanced Hacking Attacks from Start to Finish by Keatron Evans, Andrew Whitaker, Jack Voth

Chained Exploits: Advanced Hacking Attacks from Start to Finish

Keatron Evans, Andrew Whitaker, Jack Voth

279 pages missing pub info (editions)

nonfiction computer science informative medium-paced
Powered by AI (Beta)
Loading...

Description

The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of...

Read more

Community Reviews

Loading...

Content Warnings

Loading...