Login / Signup

Discovering a Profile for Protect and Defend: Penetration Testing.

Morgan A. ZantuaViatcheslav PopovskyBarbara Endicott-PopovskyFred B. Holt
Published in: HCI (25) (2018)
Keyphrases
  • penetration testing
  • security vulnerabilities
  • unauthorized access
  • user profiles
  • hardware and software
  • low cost
  • management practices
  • information technology
  • privacy protection