Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Consists of 20-25 hacking scenarios followed by the solution for each. This book features challenges/chapters that are organized by increasing levels of complexity, and covers many topics, including Web content, VPNs, Denial of Service, wireless issues, e-commerce, email attacks and more. It is a useful companion to "Hacking Exposed".
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.