-
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Author Jack B. Voth , Keatron Evans , Andrew Whitaker
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing themNowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve th....
Release Date 2009/02