×
Any view
  • Any view
  • Preview and full view
  • Full view
client=firefox-b q=q=gx8 vs em5 II from books.google.com
Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy networks that are immune to offensive exploits, tools, and scripts.