Introduction to Zero-Day Exploits

...

History and Notable Examples

...

Detection and Prevention

...

Conclusion

...