Preferred methodologies of penetration testing from information security professionals perspective /
Thesis
Main Authors: | , , |
---|---|
Format: | |
Language: | eng |
Published: |
Kuala Lumpur : Universiti Teknologi Malaysia,
2014
|
Subjects: |
_version_ | 1826460862032904192 |
---|---|
author | Mohd. Irzani Wahid, 1985-, author Bharanidharan Shanmugam, supervisor Sekolah Informatiks Termaju |
author_facet | Mohd. Irzani Wahid, 1985-, author Bharanidharan Shanmugam, supervisor Sekolah Informatiks Termaju |
author_sort | Mohd. Irzani Wahid, 1985-, author |
collection | OCEAN |
description | Thesis |
first_indexed | 2024-03-05T14:27:31Z |
format | |
id | KOHA-OAI-TEST:518952 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T14:27:31Z |
publishDate | 2014 |
publisher | Kuala Lumpur : Universiti Teknologi Malaysia, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5189522020-12-19T17:19:17ZPreferred methodologies of penetration testing from information security professionals perspective / Mohd. Irzani Wahid, 1985-, author Bharanidharan Shanmugam, supervisor Sekolah Informatiks Termaju Kuala Lumpur : Universiti Teknologi Malaysia, 2014engThesisSarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014Bibliography: p. 99-103PSZKLLPenetration testing (Computer security)Computer security |
spellingShingle | Penetration testing (Computer security) Computer security Mohd. Irzani Wahid, 1985-, author Bharanidharan Shanmugam, supervisor Sekolah Informatiks Termaju Preferred methodologies of penetration testing from information security professionals perspective / |
title | Preferred methodologies of penetration testing from information security professionals perspective / |
title_full | Preferred methodologies of penetration testing from information security professionals perspective / |
title_fullStr | Preferred methodologies of penetration testing from information security professionals perspective / |
title_full_unstemmed | Preferred methodologies of penetration testing from information security professionals perspective / |
title_short | Preferred methodologies of penetration testing from information security professionals perspective / |
title_sort | preferred methodologies of penetration testing from information security professionals perspective |
topic | Penetration testing (Computer security) Computer security |
work_keys_str_mv | AT mohdirzaniwahid1985author preferredmethodologiesofpenetrationtestingfrominformationsecurityprofessionalsperspective AT bharanidharanshanmugamsupervisor preferredmethodologiesofpenetrationtestingfrominformationsecurityprofessionalsperspective AT sekolahinformatikstermaju preferredmethodologiesofpenetrationtestingfrominformationsecurityprofessionalsperspective |