Penetration testing and network auditing: Linux
Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive,...
Saved in:
Main Authors: | Stiawan, Deris, Idris, Mohd. Yazid, Abdullah, Abdul Hanan |
---|---|
Format: | Article |
Published: |
Korea Information Processing Society
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/58772/ http://dx.doi.org/10.3745/JIPS.03.0013 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Threat and vulnerability penetration testing: Linux
by: Setiawan, Deris, et al.
Published: (2014) -
Cyber-Attack Penetration Test and Vulnerability Analysis
by: Stiawan, Deris, et al.
Published: (2017) -
Penetration testing and mitigation of vulnerabilities windows server
by: Stiawan, Deris, et al.
Published: (2016) -
Classification of habitual activities in behavior-based network detection
by: Stiawan, Deris, et al.
Published: (2010) -
Research on heteregeneous data for recognizing threat
by: Abdullah, Abdul Hanan, et al.
Published: (2011)