Threat profiling based on vulnerability assessment and penetration testing: iphone case study /

Bibliographic Details
Main Authors: Rafhana Abd Rashid, 1987-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat
Format:
Language:eng
Published: 2012
Subjects:
_version_ 1826450890529177600
author Rafhana Abd Rashid, 1987-
Norafida Ithnin
Fakulti Sains Komputer dan Sistem Maklumat
author_facet Rafhana Abd Rashid, 1987-
Norafida Ithnin
Fakulti Sains Komputer dan Sistem Maklumat
author_sort Rafhana Abd Rashid, 1987-
collection OCEAN
description
first_indexed 2024-03-05T12:01:17Z
format
id KOHA-OAI-TEST:470471
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T12:01:17Z
publishDate 2012
record_format dspace
spelling KOHA-OAI-TEST:4704712020-12-19T17:17:17ZThreat profiling based on vulnerability assessment and penetration testing: iphone case study / Rafhana Abd Rashid, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat 2012engIncludes bibliographical referencesPRZSLiPhone (Smartphone)SmartphonesComputer security
spellingShingle iPhone (Smartphone)
Smartphones
Computer security
Rafhana Abd Rashid, 1987-
Norafida Ithnin
Fakulti Sains Komputer dan Sistem Maklumat
Threat profiling based on vulnerability assessment and penetration testing: iphone case study /
title Threat profiling based on vulnerability assessment and penetration testing: iphone case study /
title_full Threat profiling based on vulnerability assessment and penetration testing: iphone case study /
title_fullStr Threat profiling based on vulnerability assessment and penetration testing: iphone case study /
title_full_unstemmed Threat profiling based on vulnerability assessment and penetration testing: iphone case study /
title_short Threat profiling based on vulnerability assessment and penetration testing: iphone case study /
title_sort threat profiling based on vulnerability assessment and penetration testing iphone case study
topic iPhone (Smartphone)
Smartphones
Computer security
work_keys_str_mv AT rafhanaabdrashid1987 threatprofilingbasedonvulnerabilityassessmentandpenetrationtestingiphonecasestudy
AT norafidaithnin threatprofilingbasedonvulnerabilityassessmentandpenetrationtestingiphonecasestudy
AT fakultisainskomputerdansistemmaklumat threatprofilingbasedonvulnerabilityassessmentandpenetrationtestingiphonecasestudy