Part 3: Breaking and Entering Computers

Part 3: Breaking and Entering Computers

Chapter 11: Probing a Target
Chapter 12: Sneaking into a Computer
Chapter 13: Digging In