Hack Attacks Testing: How to Conduct Your Own Security Audit

Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.

Saved in:
Bibliographic Details
Main Author: John Chirillo
Format: Sirkulasi
Language:Inggris
Published: Wiley Publishing,Inc 2003
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
PINJAM
id uinsukalib-068244
record_format oai_dc
spelling uinsukalib-0682442010-07-27Hack Attacks Testing: How to Conduct Your Own Security AuditJohn ChirilloKOMPUTER - KEAMANAN DATABerisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.Wiley Publishing,Inc2003Sirkulasi-; 12,5ast, c.1Inggris
institution Universitas Islam Negeri Sunan Kalijaga
collection Perpustakaan Yogyakarta
language Inggris
topic KOMPUTER - KEAMANAN DATA
spellingShingle KOMPUTER - KEAMANAN DATA
John Chirillo
Hack Attacks Testing: How to Conduct Your Own Security Audit
description Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.
format Sirkulasi
author John Chirillo
author_facet John Chirillo
author_sort John Chirillo
title Hack Attacks Testing: How to Conduct Your Own Security Audit
title_short Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full Hack Attacks Testing: How to Conduct Your Own Security Audit
title_fullStr Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full_unstemmed Hack Attacks Testing: How to Conduct Your Own Security Audit
title_sort hack attacks testing: how to conduct your own security audit
physical -; 12,5
publisher Wiley Publishing,Inc
publishDate 2003
callnumber-raw ast, c.1
callnumber-search ast, c.1
_version_ 1741226543337701376