Discover how exploit kits have evolved in recent years and why such kits still represent a serious digital threat. This book explores the reasons why exploit kits have been so successful, how they differ in their attack approach and how they have been used in everything from data theft to cryptocurrency mining. Offering extensive insight into their functionality and features, the authors will walk you through the most infamous exploit kits of the past decade, such as RIG, Blackhole, Angler and Nuclear. They explain why some were successful where others failed and how the people developing such kits consistently evolved their approach to try to stay one step ahead of security researchers.
Read More
Specifications
Book Details
Imprint
Notion Press
Dimensions
Height
6 in
Length
9 in
Weight
210 gr
Be the first to ask about this product
Safe and Secure Payments.Easy returns.100% Authentic products.