1
by Knaddison, Greg James
Published 2009
Wiley Pub.
Table of Contents: ... Reference -- Appendix B. Installing and Using Drupal 6 Fresh out of the Box -- Appendix C. Leveraging...

2
by Timm, Carl
Published 2010
Syngress/Elsevier
... and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy...

3
Published 2022
O'Reilly Media, Inc.
...In a ransomware attack, hackers use malware to encrypt network files, locking users out...