|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1117708893 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190909s2019 enk ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d EBLCP
|d OCLCF
|d UKAHL
|d OCLCQ
|d UMI
|d OCLCQ
|d COO
|d BCSLD
|d OCLCO
|d OCLCQ
|d OCLCO
|d KSU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1122791572
|
020 |
|
|
|a 9781780174099
|q (electronic bk.)
|
020 |
|
|
|a 1780174098
|q (electronic bk.)
|
020 |
|
|
|a 9781780174105
|q (electronic bk.)
|
020 |
|
|
|a 1780174101
|q (electronic bk.)
|
020 |
|
|
|a 9781780174112
|
020 |
|
|
|a 178017411X
|
020 |
|
|
|z 9781780174082
|
020 |
|
|
|z 178017408X
|
029 |
1 |
|
|a AU@
|b 000066233851
|
029 |
1 |
|
|a AU@
|b 000067735249
|
029 |
1 |
|
|a CHNEW
|b 001069822
|
029 |
1 |
|
|a CHVBK
|b 577490621
|
035 |
|
|
|a (OCoLC)1117708893
|z (OCoLC)1122791572
|
037 |
|
|
|a CL0501000075
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Penetration testing :
|b a guide for business and it managers.
|
264 |
|
1 |
|a London :
|b BCS,
|c 2019.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed September 10, 2019)
|
520 |
|
|
|a This essential guide for business and IT managers, developed in collaboration with CREST, explains the process of penetration testing and the benefits it brings. The book brings together a wide range of expertise, insight, and tips for setting up a penetration testing programme, maintaining it, and responding to the results of penetration tests.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a Knovel
|b ACADEMIC - General Engineering & Project Administration
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Business applications.
|2 bicssc
|
650 |
|
7 |
|a Computing: general.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Enterprise Applications
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
650 |
|
7 |
|a Computer security.
|2 thema
|
650 |
|
7 |
|a Information technology: general issues.
|2 thema
|
650 |
|
7 |
|a Business applications.
|2 thema
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpPTAGBIT9/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36312075
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36312074
|
938 |
|
|
|a BCS, The Chartered Institute for IT
|b BCSL
|n 9781780174099
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5892124
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2246281
|
994 |
|
|
|a 92
|b IZTAP
|