Search Results for Penetration testing (Computer security) - Narrowed by: Computer security - Computer -- Access control -- Testing
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qu$003dPenetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002b--$002bAccess$002bcontrol$002b--$002bTesting$002509Computer$002b--$002bAccess$002bcontrol$002b--$002bTesting$0026ps$003d300?dt=list
2024-05-26T06:34:41Z
Hack I.T. : security through penetration testing
ent://SD_ILS/0/SD_ILS:604409
2024-05-26T06:34:41Z
2024-05-26T06:34:41Z
by Klevinsky, T. J.<br/>Author Klevinsky, T. J., Laliberte, Scott, Gupta, Ajay<br/>Format: Computer file<br/>Call Number CP 4319<br/>Publisher Addison-Wesley,<br/>Publication Date 2002<br/>ISBN 9780201719567<br/>
Hack I.T. : security through penetration testing
ent://SD_ILS/0/SD_ILS:394189
2024-05-26T06:34:41Z
2024-05-26T06:34:41Z
by Klevinsky, T. J.<br/>Author Klevinsky, T. J., Laliberte, Scott, Gupta, Ajay<br/>Format: Books<br/>Call Number QA76.9.A25 K534 2002<br/>Publisher Addison-Wesley,<br/>Publication Date 2002<br/>ISBN 9780201719567<br/>