Product Details
Seller Description
Tags
by: Edward Skoudis
Overview
Empowers network and system administrators to defend their information and computing assets. This guide presents explanations of destructive hacker tools and tactics - and specific counter measures fo...
Read more
Be the first one to review
Review the book today!