Network Security Assessment /
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Sebastopol, CA :
O'Reilly Media, Inc.,
2004.
|
Edition: | 1st ed. |
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Search Result 1
by McNab, Chris (Chris R.), 1980-
Published 2007
Texto completo (Requiere registro previo con correo institucional)
Published 2007
Electronic
eBook