Cargando…
Effective Python penetration testing: Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Packt Publ.
2016
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2205039 |
_version_ | 1780951527552188416 |
---|---|
author | Rehim, Rejah |
author_facet | Rehim, Rejah |
author_sort | Rehim, Rejah |
collection | CERN |
id | cern-2205039 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2016 |
publisher | Packt Publ. |
record_format | invenio |
spelling | cern-22050392021-04-21T19:33:49Zhttp://cds.cern.ch/record/2205039engRehim, RejahEffective Python penetration testing: Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsComputing and ComputersPackt Publ.oai:cds.cern.ch:22050392016 |
spellingShingle | Computing and Computers Rehim, Rejah Effective Python penetration testing: Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title | Effective Python penetration testing: Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title_full | Effective Python penetration testing: Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title_fullStr | Effective Python penetration testing: Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title_full_unstemmed | Effective Python penetration testing: Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title_short | Effective Python penetration testing: Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title_sort | effective python penetration testing: pen test your system like a pro and overcome vulnerabilities by leveraging python scripts, libraries, and tools |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2205039 |
work_keys_str_mv | AT rehimrejah effectivepythonpenetrationtestingpentestyoursystemlikeaproandovercomevulnerabilitiesbyleveragingpythonscriptslibrariesandtools |