This section covers the development and deployment of software exploits.

Contents