Showing 1 - 8 results of 8 for search '"computer security"', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3

    Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / by Makan, Keith

    Published 2014
    Subjects: “…Penetration testing (Computer security) Examinations.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4

    Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / by Makan, Keith

    Published 2014
    Subjects: “…Penetration testing (Computer security) Examinations.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5

    Professional penetration testing creating and learning in a hacking lab / by Wilhelm, Thomas

    Published 2013
    Subjects: “…Penetration testing (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Professional penetration testing creating and learning in a hacking lab / by Wilhelm, Thomas

    Published 2013
    Subjects: “…Penetration testing (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7

    The basics of web hacking tools and techniques to attack the Web / by Pauli, Joshua J.

    Published 2013
    Subjects: “…Penetration testing (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8

    The basics of web hacking tools and techniques to attack the Web / by Pauli, Joshua J.

    Published 2013
    Subjects: “…Penetration testing (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook