Hack attacks testing how to conduct your own security audit
Saved in:
Main Author: | Chirillo, John 1970- |
---|---|
Format: | Unknown |
Published: |
New York
Wiley
2003
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Hack attacks revealed a complete reference for UNIX, Windows, and Linux with custom security toolkit
by: Chirillo, John 1970-
Published: (2002) -
Low tech hacking street smarts for security professionals
Published: (2012) -
The unofficial guide to ethical hacking
by: Fadia, Ankit 1985-
Published: (2006) -
Gray hat hacking the ethical hacker's handbook
Published: (2008) -
Gray hat hacking the ethical hacker's handbook
Published: (2005)