August 2025
Intermediate to advanced
917 pages
19h 41m
English
CHAPTER 5 Social Engineering, Malware Threats, and Vulnerability Analysis
CHAPTER 6 Sniffers, Session Hijacking, and Denial of Service
CHAPTER 7 Web Server Hacking, Web Applications, and Database Attacks
CHAPTER 8 Wireless Technologies, Mobile Security, and Attacks
Appendix A Answers to the “Do I Know This Already?” Quizzes and Review Questions ...