Hacking Exposed 7: Network Security Secrets and Solutions (2012)
PART I. CASING THE ESTABLISHMENT
PART II. ENDPOINT AND SERVER HACKING
CHAPTER 6. CYBERCRIME AND ADVANCED PERSISTENT THREATS
PART III. INFRASTRUCTURE HACKING
CHAPTER 7. REMOTE CONNECTIVITY AND VOIP HACKING