Cargando…
Conducting network penetration and espionage in a global environment
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...
Autor principal: | Middleton, Bruce |
---|---|
Lenguaje: | eng |
Publicado: |
Taylor and Francis
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1706432 |
Ejemplares similares
-
Cybercrime and espionage: an analysis of subversive multivector threats
por: Gragido, Will, et al.
Publicado: (2011) -
The cuckoo's egg: tracking a spy through a maze of computer espionage
por: Stoll, Cliff
Publicado: (1989) -
Business Espionage
por: Bruce Wimmer, CPP
Publicado: (2015) -
Global Polio Eradication: Espionage, Disinformation, and the Politics of Vaccination
por: Gostin, Lawrence O
Publicado: (2014) -
Learning iOS penetration testing: secure your iOS applications and uncover hidden vunerabilities by conducting penetration tests
por: Yermalkar, Swaroop
Publicado: (2016)