In this section, you will learn about a plethora of attack vectors, including network-based, software-based, mobile devices, wireless networks, and IoT devices.
This part of the book comprises the following chapters: