Skip to content
VuFind
Advanced
Advanced
  • Search: "Penetration testing (Computer security)"
Suggested Topics... within your search.
Penetration testing (Computer security) 5 Security measures 2 Computer crimes -- 1
Computer hackers 1 Computer security 1 Go (Computer program language) 1
more ...
Internet of things -- 1 Prevention 1 Testing 1
Web applications -- 1 Web sites -- 1 less ...
Showing 1 - 5 of 5 for search: '"Penetration testing (Computer security)"', query time: 0.09s
Cover Image
Zed attack proxy cookbook : hacking tactics, techniques, and procedures for testing web applications and APIs
by Soper, Ryan
Subjects: '; “...Penetration testing (Computer security)...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Bug bounty bootcamp : the guide to finding and reporting web vulnerabilities
by Li, Vickie
Subjects: '; “...Penetration testing (Computer security)...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Practical IoT hacking : the definitive guide to attacking the internet of things
by Chantzis, Fotios
Subjects: '; “...Penetration testing (Computer security)...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Black Hat Go : Go programming for hackers and pentesters
by Steele, Tom
Subjects: '; “...Penetration testing (Computer security)...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Ninja hacking : unconventional penetration testing tactics and techniques
by Wilhelm, Thomas
Published 2011
Subjects: '; “...Penetration testing (Computer security)...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Search Tools: Get RSS Feed

Narrow Search

Library
4 Shah Alam 1 Bestari Jaya
Collection
5 Book
Item Category
4 EBOOK 1 OPEN SHELF
Faculty
5 Communication, Visual Art & Computing, Faculty
Program
2 Computer Science (Network Security and Digital Forensic), Degree
Call Number
3 Q - Science 2 T - Technology
Author
1 Chantzis, Fotios 1 Li, Vickie 1 Soper, Ryan 1 Steele, Tom 1 Wilhelm, Thomas
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...