Login / Signup
Discovering a Profile for Protect and Defend: Penetration Testing.
Morgan A. Zantua
Viatcheslav Popovsky
Barbara Endicott-Popovsky
Fred B. Holt
Published in:
HCI (25) (2018)
Keyphrases
</>
penetration testing
security vulnerabilities
unauthorized access
user profiles
hardware and software
low cost
management practices
information technology
privacy protection