Login / Signup
Developing an empirical study of how qualified subjects might be selected for IT system security penetration testing.
L. M. Guard
M. D. Crossland
Marcin Paprzycki
Johnson P. Thomas
Published in:
Ann. UMCS Informatica (2004)
Keyphrases
</>
penetration testing
security vulnerabilities
intrusion detection
dos attacks
management practices
security properties
information security
statistical databases
security requirements
unauthorized access
network security
database
low cost
intrusion detection system
hardware and software