October 2010
Beginner to intermediate
464 pages
13h 19m
English
Throughout the book, we have covered various techniques and approaches to successfully developing kernel exploits. In, Chapter 9 , we change things up a little and use our attacking model to evaluate what the future may hold for us from both sides of the fence: attack and defense.
Read now
Unlock full access