Please use this identifier to cite or link to this item:
192.168.6.56/handle/123456789/87938
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.date.accessioned | 2020-05-12T18:15:24Z | - |
dc.date.available | 2020-05-12T18:15:24Z | - |
dc.date.issued | 2020-05-12 | - |
dc.identifier.uri | http://196.189.45.87:8080/handle/123456789/87938 | - |
dc.publisher | AAiT | en_US |
dc.title | Advanced IT Security | en_US |
Appears in Collections: | Year IV |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Chapter 1.pptx | 2.6 MB | Microsoft Powerpoint XML | View/Open | |
chapter 2 python.ppt | 1.6 MB | Microsoft Powerpoint | View/Open | |
Computer.Networking.A.Top-Down.Approach.6th.Edition.pdf | 8.5 MB | Adobe PDF | View/Open | |
DEFCON-18-Schearer-SHODAN.pdf | 3 MB | Adobe PDF | View/Open | |
Ethical_Hacking_and_Penetration_Testing_Guide_-_Baloch,_Rafay.pdf | 22.98 MB | Adobe PDF | View/Open | |
exploit.pptx | 180.49 kB | Microsoft Powerpoint XML | View/Open | |
Introduction.pptx | 798.89 kB | Microsoft Powerpoint XML | View/Open | |
Linux.pptx | 576.9 kB | Microsoft Powerpoint XML | View/Open | |
Overview computer network.pptx | 2.77 MB | Microsoft Powerpoint XML | View/Open | |
Recon.pptx | 7.26 MB | Microsoft Powerpoint XML | View/Open | |
reporting.pptx | 54.68 kB | Microsoft Powerpoint XML | View/Open | |
SANS 560.1.pdf | 126.91 MB | Adobe PDF | View/Open | |
SANS 560.2.pdf | 114.46 MB | Adobe PDF | View/Open | |
SANS_560.3.pdf | 15.47 MB | Adobe PDF | View/Open | |
scan.pptx | 4.93 MB | Microsoft Powerpoint XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.