1
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
...See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector...