Cite This        Tampung        Export Record
Judul Hack Attacks Testing : How To Conduct Your Own Security Audit
Pengarang John Chirillo
Penerbitan Indianapolis M & T Books 2003
Deskripsi Fisik xvi, 541p.:illus.;24 cm.
ISBN 0471229466
Subjek Hack-Attacks
Networking
Security
Abstrak A network security breah (a hack, crack, or other invesion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
Catatan Indeks : p. 523-540
Bahasa Inggris
Bentuk Karya Tidak ada kode yang sesuai
Target Pembaca Tidak ada kode yang sesuai

 
No Barcode No. Panggil Akses Lokasi Ketersediaan
00000011899 005.8/CHI/H Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
00000011897 005.8/CHI/H Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
00000011898 005.8/CHI/H Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
00000011786 005.8/CHI/H Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
00000011787 005.8/CHI/H Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
00000011785 005.8/CHI/H Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
00000011784 005.8/CHI/H Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
00000011783 005.8/CHI/H Dapat dipinjam Perpustakaan Lantai 3 - Mahkamah Konstitusi RI Tersedia
pesan
Tag Ind1 Ind2 Isi
001 INLIS000000000003612
005 20200508202354
008 200508||||||||| | ||| |||| ||eng||
020 $a 0471229466
035 0010-0520003612
041 $a eng
082 0 $a 005.8
084 $a 005.8/CHI/H
100 0 $a John Chirillo
245 0 0 $a Hack Attacks Testing : How To Conduct Your Own Security Audit
260 $a Indianapolis $b M & T Books $c 2003
300 $a xvi, 541p.$b :illus.;$c 24 cm.
500 $a Indeks : p. 523-540
520 $a A network security breah (a hack, crack, or other invesion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
650 0 $a Hack-Attacks
650 0 $a Networking
650 0 $a Security
Content Unduh katalog