Search Results for Penetration testing (Computer security) - Narrowed by: 2014 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPenetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ic$003dtrue$0026ps$003d300?dt=list 2024-11-27T17:44:58Z Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:356516 2024-11-27T17:44:58Z 2024-11-27T17:44:58Z Author&#160;Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number&#160;ONLINE(356516.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:342868 2024-11-27T17:44:58Z 2024-11-27T17:44:58Z Author&#160;Hagar, Jon Duncan, author.<br/>Preferred Shelf Number&#160;ONLINE(342868.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>