Search Results for Computers -- Access control - Narrowed by: Klevinsky, T. J SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dAUTHOR$002509Author$002509Klevinsky$00252C$002bT.$002bJ.$002509Klevinsky$00252C$002bT.$002bJ$0026ps$003d300?dt=list 2024-04-19T10:19:00Z Hack I.T. : security through penetration testing ent://SD_ILS/0/SD_ILS:604409 2024-04-19T10:19:00Z 2024-04-19T10:19:00Z by&#160;Klevinsky, T. J.<br/>Author&#160;Klevinsky, T. J.,&#160;Laliberte, Scott,&#160;Gupta, Ajay<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 4319<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780201719567<br/> Hack I.T. : security through penetration testing ent://SD_ILS/0/SD_ILS:394189 2024-04-19T10:19:00Z 2024-04-19T10:19:00Z by&#160;Klevinsky, T. J.<br/>Author&#160;Klevinsky, T. J.,&#160;Laliberte, Scott,&#160;Gupta, Ajay<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K534 2002<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780201719567<br/>