Hack Attacks Testing: How to Conduct Your Own Security Audit
ws.c.1/stoc6, c.1
Saved in:
Main Author: | |
---|---|
Format: | Sirkulasi |
Language: | Inggris |
Published: |
Wiley Publishing,Inc
2003
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
uinsukalib-062948 |
---|---|
record_format |
oai_dc |
spelling |
uinsukalib-0629482009-07-03Hack Attacks Testing: How to Conduct Your Own Security AuditJohn ChirilloKOMPUTER - KEAMANAN DATAws.c.1/stoc6, c.1Wiley Publishing,Inc2003Sirkulasi540; 24ws,.01Inggris |
institution |
Universitas Islam Negeri Sunan Kalijaga |
collection |
Perpustakaan Yogyakarta |
language |
Inggris |
topic |
KOMPUTER - KEAMANAN DATA |
spellingShingle |
KOMPUTER - KEAMANAN DATA John Chirillo Hack Attacks Testing: How to Conduct Your Own Security Audit |
description |
ws.c.1/stoc6, c.1 |
format |
Sirkulasi |
author |
John Chirillo |
author_facet |
John Chirillo |
author_sort |
John Chirillo |
title |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_short |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_full |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_fullStr |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_full_unstemmed |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_sort |
hack attacks testing: how to conduct your own security audit |
physical |
540; 24 |
publisher |
Wiley Publishing,Inc |
publishDate |
2003 |
callnumber-raw |
ws,.01 |
callnumber-search |
ws,.01 |
_version_ |
1741225609838723072 |