Chapter 21 Evaluation of Exploits