Hack Attacks Testing: how to conducy your own security audit
Saved in:
Main Author: | |
---|---|
Format: | TEXT |
Published: |
John Wiley & Sons
2003
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
amikomlib-9780471229469 |
---|---|
record_format |
oai_dc |
spelling |
amikomlib-9780471229469 2016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAHack Attacks Testing: how to conducy your own security auditJohn ChirilloJohn Wiley & Sons2003TEXT005.8 |
institution |
Universitas Amikom Yogyakarta |
collection |
Perpustakaan Yogyakarta |
description |
|
format |
TEXT |
author |
John Chirillo |
spellingShingle |
John Chirillo Hack Attacks Testing: how to conducy your own security audit |
author_facet |
John Chirillo |
author_sort |
John Chirillo |
title |
Hack Attacks Testing: how to conducy your own security audit |
title_short |
Hack Attacks Testing: how to conducy your own security audit |
title_full |
Hack Attacks Testing: how to conducy your own security audit |
title_fullStr |
Hack Attacks Testing: how to conducy your own security audit |
title_full_unstemmed |
Hack Attacks Testing: how to conducy your own security audit |
title_sort |
hack attacks testing: how to conducy your own security audit |
publisher |
John Wiley & Sons |
publishDate |
2003 |
callnumber-raw |
005.8 |
callnumber-search |
005.8 |
_version_ |
1742477420846383104 |