WEb Hacking Attacks and Defense

Saved in:
Bibliographic Details
Main Author: Shreeraj Shah
Format: TEXT
Published: John Wiley & Sons
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
PINJAM
id amikomlib-2435
record_format oai_dc
spelling amikomlib-24352016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAWEb Hacking Attacks and DefenseShreeraj ShahIn the evolution of hacking, firewalls are a mere speed bump. Hacking continues to develop, becoming ever more sophisticated, adapting and growing in ingenuity as well as in the damage that results. Web attacks running over web ports strike with enormous iJohn Wiley & SonsTEXT
institution Universitas Amikom Yogyakarta
collection Perpustakaan Yogyakarta
topic In the evolution of hacking, firewalls are a mere speed bump. Hacking continues to develop, becoming ever more sophisticated, adapting and growing in ingenuity as well as in the damage that results. Web attacks running over web ports strike with enormous i
spellingShingle In the evolution of hacking, firewalls are a mere speed bump. Hacking continues to develop, becoming ever more sophisticated, adapting and growing in ingenuity as well as in the damage that results. Web attacks running over web ports strike with enormous i
Shreeraj Shah
WEb Hacking Attacks and Defense
description
format TEXT
author Shreeraj Shah
author_facet Shreeraj Shah
author_sort Shreeraj Shah
title WEb Hacking Attacks and Defense
title_short WEb Hacking Attacks and Defense
title_full WEb Hacking Attacks and Defense
title_fullStr WEb Hacking Attacks and Defense
title_full_unstemmed WEb Hacking Attacks and Defense
title_sort web hacking attacks and defense
publisher John Wiley & Sons
publishDate
_version_ 1742475572472184832