Hack Attacks Testing: How to Conduct Your Own Security Audit
Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.
Saved in:
Main Author: | |
---|---|
Format: | Sirkulasi |
Language: | Inggris |
Published: |
Wiley Publishing,Inc
2003
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
uinsukalib-068244 |
---|---|
record_format |
oai_dc |
spelling |
uinsukalib-0682442010-07-27Hack Attacks Testing: How to Conduct Your Own Security AuditJohn ChirilloKOMPUTER - KEAMANAN DATABerisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.Wiley Publishing,Inc2003Sirkulasi-; 12,5ast, c.1Inggris |
institution |
Universitas Islam Negeri Sunan Kalijaga |
collection |
Perpustakaan Yogyakarta |
language |
Inggris |
topic |
KOMPUTER - KEAMANAN DATA |
spellingShingle |
KOMPUTER - KEAMANAN DATA John Chirillo Hack Attacks Testing: How to Conduct Your Own Security Audit |
description |
Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download. |
format |
Sirkulasi |
author |
John Chirillo |
author_facet |
John Chirillo |
author_sort |
John Chirillo |
title |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_short |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_full |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_fullStr |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_full_unstemmed |
Hack Attacks Testing: How to Conduct Your Own Security Audit |
title_sort |
hack attacks testing: how to conduct your own security audit |
physical |
-; 12,5 |
publisher |
Wiley Publishing,Inc |
publishDate |
2003 |
callnumber-raw |
ast, c.1 |
callnumber-search |
ast, c.1 |
_version_ |
1741226543337701376 |