Penetration Testing and Network Auditing: Linux
Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah, Journal of Information Processing Systems Vol. 11, No. 1, pp. 104-115, Mar. 2015
https://doi.org/10.3745/JIPS.03.0013
Keywords: Network attack, network auditing, network forensic
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Stiawan, D., Idris, M., & Abdullah, A. (2015). Penetration Testing and Network Auditing: Linux. Journal of Information Processing Systems, 11(1), 104-115. DOI: 10.3745/JIPS.03.0013.
[IEEE Style]
D. Stiawan, M. Y. Idris, A. H. Abdullah, "Penetration Testing and Network Auditing: Linux," Journal of Information Processing Systems, vol. 11, no. 1, pp. 104-115, 2015. DOI: 10.3745/JIPS.03.0013.
[ACM Style]
Deris Stiawan, Mohd. Yazid Idris, and Abdul Hanan Abdullah. 2015. Penetration Testing and Network Auditing: Linux. Journal of Information Processing Systems, 11, 1, (2015), 104-115. DOI: 10.3745/JIPS.03.0013.