Penetration Testing and Network Auditing: Linux
Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah, Journal of Information Processing Systems Vol. 11, No. 1, pp. 104-115, Mar. 2015
Keywords: Network attack, network auditing, network forensic
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Stiawan, D., Idris, M., & Abdullah, A. (2015). Penetration Testing and Network Auditing: Linux. Journal of Information Processing Systems, 11(1), 104-115. DOI: 10.3745/JIPS.03.0013.
[IEEE Style]
D. Stiawan, M. Y. Idris, A. H. Abdullah, "Penetration Testing and Network Auditing: Linux," Journal of Information Processing Systems, vol. 11, no. 1, pp. 104-115, 2015. DOI: 10.3745/JIPS.03.0013.
[ACM Style]
Deris Stiawan, Mohd. Yazid Idris, and Abdul Hanan Abdullah. 2015. Penetration Testing and Network Auditing: Linux. Journal of Information Processing Systems, 11, 1, (2015), 104-115. DOI: 10.3745/JIPS.03.0013.