Hack Attacks Testing: How to Conduct Your Own Security Audit

Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.

Saved in:
Bibliografiske detaljer
Hovedforfatter: John Chirillo
Format: Sirkulasi
Sprog:Inggris
Udgivet: Wiley Publishing,Inc 2003
Fag:
Tags: Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!
PINJAM
id uinsukalib-068244
record_format oai_dc
spelling uinsukalib-0682442010-07-27Hack Attacks Testing: How to Conduct Your Own Security AuditJohn ChirilloKOMPUTER - KEAMANAN DATABerisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.Wiley Publishing,Inc2003Sirkulasi-; 12,5ast, c.1Inggris
institution Universitas Islam Negeri Sunan Kalijaga
collection Perpustakaan Yogyakarta
language Inggris
topic KOMPUTER - KEAMANAN DATA
spellingShingle KOMPUTER - KEAMANAN DATA
John Chirillo
Hack Attacks Testing: How to Conduct Your Own Security Audit
description Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.
format Sirkulasi
author John Chirillo
author_facet John Chirillo
author_sort John Chirillo
title Hack Attacks Testing: How to Conduct Your Own Security Audit
title_short Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full Hack Attacks Testing: How to Conduct Your Own Security Audit
title_fullStr Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full_unstemmed Hack Attacks Testing: How to Conduct Your Own Security Audit
title_sort hack attacks testing: how to conduct your own security audit
physical -; 12,5
publisher Wiley Publishing,Inc
publishDate 2003
callnumber-raw ast, c.1
callnumber-search ast, c.1
_version_ 1741226543337701376