Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Targeted Cyber Attacks Multistaged Attacks Driven By Exploits And MalwareTargeted Cyber Attacks Multistaged Attacks Driven By Exploits And Malware

Targeted Cyber Attacks Multistaged Attacks Driven By Exploits And Malware

Aditya Sood

Details

OL Work ID
OL17467480W

Subjects

Malware (computer software)Computer securityCyberspaceComputer crimesComputer SecurityComputer networksSecurity measuresPrevention

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.