Показать сокращенную информацию
dc.contributor.author | Chauhan Ajay Singh | |
dc.date.accessioned | 2024-01-29T22:04:21Z | |
dc.date.available | 2024-01-29T22:04:21Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Chauhan. Practical network scanning: capture network vulnerabilities using standard tools such as Nmap and Nessus - 1 online resource (1 volume) : - URL: https://libweb.kpfu.ru/ebsco/pdf/1817504.pdf | |
dc.identifier.isbn | 9781788832496 | |
dc.identifier.isbn | 1788832493 | |
dc.identifier.isbn | 1788839234 | |
dc.identifier.isbn | 9781788839235 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/180246 | |
dc.description | Includes bibliographical references. | |
dc.language | English | |
dc.language.iso | en | |
dc.subject.other | Computer networks -- Security measures. | |
dc.subject.other | Computers -- Access control. | |
dc.subject.other | Computer security. | |
dc.subject.other | Penetration testing (Computer security) | |
dc.subject.other | COMPUTERS / Security / Networking. | |
dc.subject.other | Computer networks -- Security measures. | |
dc.subject.other | Computer security. | |
dc.subject.other | Computers -- Access control. | |
dc.subject.other | Penetration testing (Computer security) | |
dc.subject.other | Electronic books. | |
dc.title | Practical network scanning: capture network vulnerabilities using standard tools such as Nmap and Nessus/ Ajay Singh Chauhan. | |
dc.type | Book | |
dc.description.pages | 1 online resource (1 volume) : | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C1199 |