Please use this identifier to cite or link to this item:
192.168.6.56/handle/123456789/17096
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chirillo, John | |
dc.date.accessioned | 2018-11-02T08:28:11Z | |
dc.date.accessioned | 2020-05-15T19:27:10Z | - |
dc.date.available | 2018-11-02T08:28:11Z | |
dc.date.available | 2020-05-15T19:27:10Z | - |
dc.date.issued | 2003 | |
dc.identifier.isbn | 0-471-22946-6 | |
dc.identifier.uri | http://196.189.45.87:8080/handle/123456789/17096 | - |
dc.language.iso | en | en_US |
dc.publisher | John Wiley & Sons, Inc | en_US |
dc.subject | Hack Attacks Testing | en_US |
dc.title | Hack Attacks Testing How to Conduct Your Own Security Audit | en_US |
dc.type | Book | en_US |
Appears in Collections: | Accounting and Finance |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
92.John Chirillo.pdf | 8.67 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.