An edition of Chained exploits (2009)

Chained exploits

advanced hacking attacks from start to finish

Locate

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today


Buy this book

Last edited by ImportBot
August 21, 2020 | History
An edition of Chained exploits (2009)

Chained exploits

advanced hacking attacks from start to finish

Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don't cover them at all. Now there's book that brings together start-to-finish information about today's most widespread chained exploits-both how to perform them and how to prevent them.

Publish Date
Publisher
Addison-Wesley
Language
English
Pages
300

Buy this book

Edition Availability
Cover of: Chained Exploits
Chained Exploits: Advanced Hacking Attacks from Start to Finish
2021, Pearson Education, Limited
in English
Cover of: Chained exploits
Chained exploits: advanced hacking attacks from start to finish
2009, Addison-Wesley
in English
Cover of: Chained exploits
Chained exploits: advanced hacking attacks from start to finish
2009, Addison-Wesley
in English
Cover of: Chained Exploits
Chained Exploits: Advanced Hacking Attacks from Start to Finish
2009, Addison-Wesley Longman, Incorporated
in English

Add another edition?

Book Details


Edition Notes

Biography: Andrew Whitaker (Vancouver, WA), Director of Enterprise InfoSec and Networking for The Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He co-authored Penetration Testing and Network Defense. Keatron Evans (Chicago, IL) is President and Chief Security Consultant of Integra Business Services LLC, a trainer for The Training Camp, and winner of EC Council's Instructor of Excellence Award. Jack Voth (SW Florida) specializes in penetration testing, vulnerability assessment, and perimeter security. Voth co-owns The Client Server, Inc., and teaches for The Training Camp throughout the US and abroad.

Published in
Upper Saddle River, NJ

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 W44 2009, QA76.9.A25

The Physical Object

Pagination
p. cm.
Number of pages
300

ID Numbers

Open Library
OL23016471M
ISBN 10
032149881X
ISBN 13
9780321498816
LCCN
2009002128
Library Thing
8110417
Goodreads
5487000

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

History

Download catalog record: RDF / JSON
August 21, 2020 Edited by ImportBot import existing book
April 28, 2010 Edited by Open Library Bot Linked existing covers to the work.
February 7, 2010 Edited by WorkBot add more information to works
December 10, 2009 Created by WorkBot add works page