Search Results for Penetration testing (Computer security) - Narrowed by: 2014SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPenetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ic$003dtrue$0026ps$003d300?dt=list2024-11-27T17:44:58ZConducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:3565162024-11-27T17:44:58Z2024-11-27T17:44:58ZAuthor Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number ONLINE(356516.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software test attacks to break mobile and embedded devicesent://SD_ILS/0/SD_ILS:3428682024-11-27T17:44:58Z2024-11-27T17:44:58ZAuthor Hagar, Jon Duncan, author.<br/>Preferred Shelf Number ONLINE(342868.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>