Managing network security — Part 9: Penetration testing?
✍ Scribed by Fred Cohen
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 474 KB
- Volume
- 1997
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
Over the last few years computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management deci
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management dec