Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Penetration testing (Computer security) Computer crimes -- 1 Computer hackers 1
Computer security 1 Prevention 1 Reinforcement learning 1
more ...
Testing 1 Web applications -- 1 less ...
Showing 1 - 3 of 3 for search: '', query time: 0.08s
Cover Image
Ninja hacking : unconventional penetration testing tactics and techniques
by Wilhelm, Thomas
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Zed attack proxy cookbook : hacking tactics, techniques, and procedures for testing web applications and APIs
by Soper, Ryan
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Reinforcement learning for cyber operations : applications of artificial intelligence for penetration testing
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Call Number: Q - Science Program: Computer Science (Network Security and Digital Forensic), Degree Suggested Topics: Penetration testing (Computer security)
Library
2 Shah Alam 1 Bestari Jaya
Collection
3 Book
Item Category
2 EBOOK 1 OPEN SHELF
Faculty
3 Communication, Visual Art & Computing, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree
Call Number
Q - Science
Author
1 Soper, Ryan 1 Wilhelm, Thomas
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...