You are reading

The Exploit Development Process