Network Security Assessment /
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Sebastopol, CA :
O'Reilly Media, Inc.,
2004.
|
Édition: | 1st ed. |
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |