Hack attacks testing : how to conduct your own security audit /
57
Main Author: | |
---|---|
Format: | |
Language: | eng |
Published: |
Indianapolis, Ind. Wiley Publishing,
2003
|
Subjects: |
_version_ | 1826412431046344704 |
---|---|
author | Chirillo, John, 1970- |
author_facet | Chirillo, John, 1970- |
author_sort | Chirillo, John, 1970- |
collection | OCEAN |
description | 57 |
first_indexed | 2024-03-05T02:30:04Z |
format | |
id | KOHA-OAI-TEST:280218 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T02:30:04Z |
publishDate | 2003 |
publisher | Indianapolis, Ind. Wiley Publishing, |
record_format | dspace |
spelling | KOHA-OAI-TEST:2802182020-12-19T17:09:04ZHack attacks testing : how to conduct your own security audit / Chirillo, John, 1970- Indianapolis, Ind. Wiley Publishing,2003eng575859PSZJBLComputer securityComputer hackersURN:ISBN:0471229466 (pbk.) |
spellingShingle | Computer security Computer hackers Chirillo, John, 1970- Hack attacks testing : how to conduct your own security audit / |
title | Hack attacks testing : how to conduct your own security audit / |
title_full | Hack attacks testing : how to conduct your own security audit / |
title_fullStr | Hack attacks testing : how to conduct your own security audit / |
title_full_unstemmed | Hack attacks testing : how to conduct your own security audit / |
title_short | Hack attacks testing : how to conduct your own security audit / |
title_sort | hack attacks testing how to conduct your own security audit |
topic | Computer security Computer hackers |
work_keys_str_mv | AT chirillojohn1970 hackattackstestinghowtoconductyourownsecurityaudit |