Hack Attacks Testing: how to conducy your own security audit

Saved in:
Bibliographic Details
Main Author: John Chirillo
Format: TEXT
Published: John Wiley & Sons
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
PINJAM
id amikomlib-2896
record_format oai_dc
spelling amikomlib-28962016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAHack Attacks Testing: how to conducy your own security auditJohn ChirilloLearn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible deJohn Wiley & SonsTEXT
institution Universitas Amikom Yogyakarta
collection Perpustakaan Yogyakarta
topic Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible de
spellingShingle Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible de
John Chirillo
Hack Attacks Testing: how to conducy your own security audit
description
format TEXT
author John Chirillo
author_facet John Chirillo
author_sort John Chirillo
title Hack Attacks Testing: how to conducy your own security audit
title_short Hack Attacks Testing: how to conducy your own security audit
title_full Hack Attacks Testing: how to conducy your own security audit
title_fullStr Hack Attacks Testing: how to conducy your own security audit
title_full_unstemmed Hack Attacks Testing: how to conducy your own security audit
title_sort hack attacks testing: how to conducy your own security audit
publisher John Wiley & Sons
publishDate
_version_ 1742475692405161984