Hack Attacks Testing: How to Conduct Your Own Security Audit

Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.

שמור ב:
מידע ביבליוגרפי
מחבר ראשי: John Chirillo
פורמט: Sirkulasi
שפה:Inggris
יצא לאור: Wiley Publishing,Inc 2003
נושאים:
תגים: הוספת תג
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!
PINJAM
id uinsukalib-068244
record_format oai_dc
spelling uinsukalib-0682442010-07-27Hack Attacks Testing: How to Conduct Your Own Security AuditJohn ChirilloKOMPUTER - KEAMANAN DATABerisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.Wiley Publishing,Inc2003Sirkulasi-; 12,5ast, c.1Inggris
institution Universitas Islam Negeri Sunan Kalijaga
collection Perpustakaan Yogyakarta
language Inggris
topic KOMPUTER - KEAMANAN DATA
spellingShingle KOMPUTER - KEAMANAN DATA
John Chirillo
Hack Attacks Testing: How to Conduct Your Own Security Audit
description Berisi : Berisi teks petunjuk untuk melakukan keamanan data secara interaktif disediakan juga link untuk download.
format Sirkulasi
author John Chirillo
author_facet John Chirillo
author_sort John Chirillo
title Hack Attacks Testing: How to Conduct Your Own Security Audit
title_short Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full Hack Attacks Testing: How to Conduct Your Own Security Audit
title_fullStr Hack Attacks Testing: How to Conduct Your Own Security Audit
title_full_unstemmed Hack Attacks Testing: How to Conduct Your Own Security Audit
title_sort hack attacks testing: how to conduct your own security audit
physical -; 12,5
publisher Wiley Publishing,Inc
publishDate 2003
callnumber-raw ast, c.1
callnumber-search ast, c.1
_version_ 1741226543337701376