Hacking for dummies
I tiakina i:
Kaituhi matua: | |
---|---|
Kaituhi rangatōpū: | |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Indianapolis, Ind. :
John Wiley & Sons, Inc.,
2013.
|
Putanga: | 4th ed. |
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- pt. I. Building the foundation for ethical hacking
- pt. II. Putting ethical hacking in motion
- pt. III. Hacking network hosts
- pt. IV. Hacking operating systems
- pt. V. Hacking applications
- pt. VI. Ethical hacking aftermath
- pt. VII. The part of tens.