|
by Najera-Gutierrez, Gilberto, Ansari, Juned Ahmed, Teixeira, Daniel, Singh, Abhinav
Published 2019
Table of Contents:
“... methodologies; Ethical hacking; Penetration testing; Vulnerability assessment; Security audits; Considerations...”Published 2019
Packt Publishing