Managing A Network Vulnerability Assessment
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and...
محفوظ في:
المؤلفون الرئيسيون: | Blackley, John A, Peltier, Justin, Peltier, Thomas |
---|---|
التنسيق: | كتاب |
اللغة: | English |
منشور في: |
CRC Press
2009
|
الوصول للمادة أونلاين: | https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1320 |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
مواد مشابهة
-
How to Complete a Risk Assessment in 5 Days or Less
بواسطة: Peltier, Thomas
منشور في: (2009) -
Complete Guide to CISM Certification
بواسطة: Peltier, Thomas, وآخرون
منشور في: (2009) -
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
بواسطة: Peltier, Thomas
منشور في: (2009) -
Assessment of Vulnerability to Natural Hazards :
منشور في: (2014) -
Vulnerability assessment of a large sized power system using neural network considering various feature extraction methods /
بواسطة: Haidar, Ahmed M. A.