September 2015
Intermediate to advanced
608 pages
21h 29m
English
Most attackers do not want to be discovered and so they use a variety of techniques to remain in the shadows when attempting to compromise a network, as described in Table 1-5.
Table 1-5 Attack Methods
Read now
Unlock full access