Hack Attacks Testing: how to conducy your own security audit
Saved in:
Main Author: | John Chirillo |
---|---|
Format: | TEXT |
Published: |
John Wiley & Sons
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Corporate computer and network securityRaymond R. Panko
by: Panko, Raymond R.
Published: (2004) -
Beginning cryptography with JavaDavid Hook
by: Hook, David
Published: (2005) -
Melumpuhkan hacker dengan web application firewall (WAF) (ada CD)
by: Digdo, Girindro Pringgo
Published: (2016) -
Network security: a beginner's guide
by: Maiwald, Eric
Published: (2003) -
Security+ guide to network security fundamentals [ada CD]
by: Campbell, Paul
Published: (2003)