Hack Attacks Testing: How to Conduct Your Own Security Audit

ws.c.1/stoc6, c.1

Saved in:
Bibliographic Details
Main Author: John Chirillo
Format: Sirkulasi
Language:Inggris
Published: Wiley Publishing,Inc 2003
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
PINJAM
id uinsukalib-062948
record_format oai_dc
spelling uinsukalib-0629482009-07-03Hack Attacks Testing: How to Conduct Your Own Security AuditJohn ChirilloKOMPUTER - KEAMANAN DATAws.c.1/stoc6, c.1Wiley Publishing,Inc2003Sirkulasi540; 24ws,.01Inggris
institution Universitas Islam Negeri Sunan Kalijaga
collection Perpustakaan Yogyakarta
language Inggris
topic KOMPUTER - KEAMANAN DATA
spellingShingle KOMPUTER - KEAMANAN DATA
John Chirillo
Hack Attacks Testing: How to Conduct Your Own Security Audit
description ws.c.1/stoc6, c.1
format Sirkulasi
author John Chirillo
author_facet John Chirillo
author_sort John Chirillo
title Hack Attacks Testing: How to Conduct Your Own Security Audit
title_short Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full Hack Attacks Testing: How to Conduct Your Own Security Audit
title_fullStr Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full_unstemmed Hack Attacks Testing: How to Conduct Your Own Security Audit
title_sort hack attacks testing: how to conduct your own security audit
physical 540; 24
publisher Wiley Publishing,Inc
publishDate 2003
callnumber-raw ws,.01
callnumber-search ws,.01
_version_ 1741225609838723072