 |
|
 Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... |  |  The Fashion Business: Theory, Practice, Image (Dress, Body, Culture Series)This book derives from a series of lectures organised by Kingston University in collaboration with the Italian manufacturer retailer MaxMara. The lectures, entitled ‘Perspectives in Fashion’, were launched in 1994 to explore emerging themes in the history and theory of fashion, with the objective of considering them in the context of... |  |  Scalable VoIP Mobility: Integration and DeploymentToday's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these networks and the availability of dual-mode handsets... |
|
|
|
|
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 |