Hack Attacks Testing: How to Conduct Your Own Security Audit

Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.

Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Prif Awdur: John Chirillo
Fformat: Sirkulasi
Iaith:Inggris
Cyhoeddwyd: Wiley Publishing,Inc 2003
Pynciau:
Tagiau: Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
PINJAM
id uinsukalib-068244
record_format oai_dc
spelling uinsukalib-0682442010-07-27Hack Attacks Testing: How to Conduct Your Own Security AuditJohn ChirilloKOMPUTER - KEAMANAN DATABerisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.Wiley Publishing,Inc2003Sirkulasi-; 12,5ast, c.1Inggris
institution Universitas Islam Negeri Sunan Kalijaga
collection Perpustakaan Yogyakarta
language Inggris
topic KOMPUTER - KEAMANAN DATA
spellingShingle KOMPUTER - KEAMANAN DATA
John Chirillo
Hack Attacks Testing: How to Conduct Your Own Security Audit
description Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.
format Sirkulasi
author John Chirillo
author_facet John Chirillo
author_sort John Chirillo
title Hack Attacks Testing: How to Conduct Your Own Security Audit
title_short Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full Hack Attacks Testing: How to Conduct Your Own Security Audit
title_fullStr Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full_unstemmed Hack Attacks Testing: How to Conduct Your Own Security Audit
title_sort hack attacks testing: how to conduct your own security audit
physical -; 12,5
publisher Wiley Publishing,Inc
publishDate 2003
callnumber-raw ast, c.1
callnumber-search ast, c.1
_version_ 1741226543337701376