Login / Signup
A guide to penetration testing.
Andrew Tang
Published in:
Netw. Secur. (2014)
Keyphrases
</>
penetration testing
security vulnerabilities
database
management practices
website
outlier detection
customer data