Hacking for dummies
Furkejuvvon:
Váldodahkki: | |
---|---|
Searvvušdahkki: | |
Materiálatiipa: | Elektrovnnalaš E-girji |
Giella: | eaŋgalasgiella |
Almmustuhtton: |
Indianapolis, Ind. :
John Wiley & Sons, Inc.,
2013.
|
Preanttus: | 4th ed. |
Fáttát: | |
Liŋkkat: | An electronic book accessible through the World Wide Web; click to view |
Fáddágilkorat: |
Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
Sisdoallologahallan:
- pt. I. Building the foundation for ethical hacking
- pt. II. Putting ethical hacking in motion
- pt. III. Hacking network hosts
- pt. IV. Hacking operating systems
- pt. V. Hacking applications
- pt. VI. Ethical hacking aftermath
- pt. VII. The part of tens.