Login / Signup
Uncover Security Weakness Before the Attacker Through Penetration Testing.
Christian D. Hines
Md Minhaz Chowdhury
Published in:
EIT (2022)
Keyphrases
</>
penetration testing
security vulnerabilities
intrusion detection
sql injection
hardware and software
access control
defense mechanisms
network security
dos attacks
security properties
anomaly detection
security policies
key management