Preferred methodologies of penetration testing from information security professionals perspective /

Thesis

Bibliographic Details
Main Authors: Mohd. Irzani Wahid, 1985-, author, Bharanidharan Shanmugam, supervisor, Sekolah Informatiks Termaju
Format:
Language:eng
Published: Kuala Lumpur : Universiti Teknologi Malaysia, 2014
Subjects:
_version_ 1826460862032904192
author Mohd. Irzani Wahid, 1985-, author
Bharanidharan Shanmugam, supervisor
Sekolah Informatiks Termaju
author_facet Mohd. Irzani Wahid, 1985-, author
Bharanidharan Shanmugam, supervisor
Sekolah Informatiks Termaju
author_sort Mohd. Irzani Wahid, 1985-, author
collection OCEAN
description Thesis
first_indexed 2024-03-05T14:27:31Z
format
id KOHA-OAI-TEST:518952
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T14:27:31Z
publishDate 2014
publisher Kuala Lumpur : Universiti Teknologi Malaysia,
record_format dspace
spelling KOHA-OAI-TEST:5189522020-12-19T17:19:17ZPreferred methodologies of penetration testing from information security professionals perspective / Mohd. Irzani Wahid, 1985-, author Bharanidharan Shanmugam, supervisor Sekolah Informatiks Termaju Kuala Lumpur : Universiti Teknologi Malaysia, 2014engThesisSarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014Bibliography: p. 99-103PSZKLLPenetration testing (Computer security)Computer security
spellingShingle Penetration testing (Computer security)
Computer security
Mohd. Irzani Wahid, 1985-, author
Bharanidharan Shanmugam, supervisor
Sekolah Informatiks Termaju
Preferred methodologies of penetration testing from information security professionals perspective /
title Preferred methodologies of penetration testing from information security professionals perspective /
title_full Preferred methodologies of penetration testing from information security professionals perspective /
title_fullStr Preferred methodologies of penetration testing from information security professionals perspective /
title_full_unstemmed Preferred methodologies of penetration testing from information security professionals perspective /
title_short Preferred methodologies of penetration testing from information security professionals perspective /
title_sort preferred methodologies of penetration testing from information security professionals perspective
topic Penetration testing (Computer security)
Computer security
work_keys_str_mv AT mohdirzaniwahid1985author preferredmethodologiesofpenetrationtestingfrominformationsecurityprofessionalsperspective
AT bharanidharanshanmugamsupervisor preferredmethodologiesofpenetrationtestingfrominformationsecurityprofessionalsperspective
AT sekolahinformatikstermaju preferredmethodologiesofpenetrationtestingfrominformationsecurityprofessionalsperspective