February 2018
Intermediate to advanced
396 pages
9h 38m
English
Logical and hardware-related exploits are very dangerous. Imagine an attacker who can not only compromise the operating system, but also have full control on the hardware itself. It could be a disaster. Next, we will take a look at related hardware vulnerability that allows attackers to attack a Linux hardware infrastructure.
Read now
Unlock full access