Threat profiling based on vulnerability assessment and penetration testing: iphone case study /
Main Authors: | , , |
---|---|
Format: | |
Language: | eng |
Published: |
2012
|
Subjects: |
_version_ | 1826450890529177600 |
---|---|
author | Rafhana Abd Rashid, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat |
author_facet | Rafhana Abd Rashid, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat |
author_sort | Rafhana Abd Rashid, 1987- |
collection | OCEAN |
description | |
first_indexed | 2024-03-05T12:01:17Z |
format | |
id | KOHA-OAI-TEST:470471 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T12:01:17Z |
publishDate | 2012 |
record_format | dspace |
spelling | KOHA-OAI-TEST:4704712020-12-19T17:17:17ZThreat profiling based on vulnerability assessment and penetration testing: iphone case study / Rafhana Abd Rashid, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat 2012engIncludes bibliographical referencesPRZSLiPhone (Smartphone)SmartphonesComputer security |
spellingShingle | iPhone (Smartphone) Smartphones Computer security Rafhana Abd Rashid, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat Threat profiling based on vulnerability assessment and penetration testing: iphone case study / |
title | Threat profiling based on vulnerability assessment and penetration testing: iphone case study / |
title_full | Threat profiling based on vulnerability assessment and penetration testing: iphone case study / |
title_fullStr | Threat profiling based on vulnerability assessment and penetration testing: iphone case study / |
title_full_unstemmed | Threat profiling based on vulnerability assessment and penetration testing: iphone case study / |
title_short | Threat profiling based on vulnerability assessment and penetration testing: iphone case study / |
title_sort | threat profiling based on vulnerability assessment and penetration testing iphone case study |
topic | iPhone (Smartphone) Smartphones Computer security |
work_keys_str_mv | AT rafhanaabdrashid1987 threatprofilingbasedonvulnerabilityassessmentandpenetrationtestingiphonecasestudy AT norafidaithnin threatprofilingbasedonvulnerabilityassessmentandpenetrationtestingiphonecasestudy AT fakultisainskomputerdansistemmaklumat threatprofilingbasedonvulnerabilityassessmentandpenetrationtestingiphonecasestudy |