Search alternatives:
"poet" » "port", "poem"

1
by Gupta, Sunil
Published 2020
EC-Council, Safari
... attacks. You will also learn wireless hacking along with exploitation and post-exploitation techniques...

2
by Gupta, Sunil
Published 2018
Apress
... this you will look at the post-exploitation phase of the attack to determine the value of the compromised...