Search Results for Penetration testing (Computer security) - Narrowed by: Computer security - Computer -- Access control -- Testing SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dPenetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002b--$002bAccess$002bcontrol$002b--$002bTesting$002509Computer$002b--$002bAccess$002bcontrol$002b--$002bTesting$0026ps$003d300?dt=list 2024-05-26T06:34:41Z Hack I.T. : security through penetration testing ent://SD_ILS/0/SD_ILS:604409 2024-05-26T06:34:41Z 2024-05-26T06:34:41Z by&#160;Klevinsky, T. J.<br/>Author&#160;Klevinsky, T. J.,&#160;Laliberte, Scott,&#160;Gupta, Ajay<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 4319<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780201719567<br/> Hack I.T. : security through penetration testing ent://SD_ILS/0/SD_ILS:394189 2024-05-26T06:34:41Z 2024-05-26T06:34:41Z by&#160;Klevinsky, T. J.<br/>Author&#160;Klevinsky, T. J.,&#160;Laliberte, Scott,&#160;Gupta, Ajay<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K534 2002<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780201719567<br/>