Consists of 20-25 hacking scenarios followed by the solution for each. This book features challenges/chapters that are organized by increasing levels of complexity, and covers many topics, including Web content, VPNs, Denial of Service, wireless issues, e-commerce, email attacks and more. It is a useful companion to "Hacking Exposed".
Bio de l'auteur
Sommaire / contenu