Chapter 7. Vulnerability Mapping
- Kali Linux 2:Assuring Security by Penetration Testing(Third Edition)
- Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 377字
- 2021-08-20 10:28:42
上QQ閱讀APP看后續(xù)精彩內容
登錄訂閱本章 >
推薦閱讀
- 嵌入式軟件系統(tǒng)測試:基于形式化方法的自動化測試解決方案
- Debian 7:System Administration Best Practices
- Python自動化運維快速入門
- Hands-On Enterprise Automation with Python.
- Spring Boot Cookbook
- 深入分布式緩存:從原理到實踐
- Visual FoxPro程序設計習題集及實驗指導(第四版)
- PHP+MySQL+Dreamweaver動態(tài)網(wǎng)站開發(fā)從入門到精通(第3版)
- Learning Modular Java Programming
- OpenCV 3.0 Computer Vision with Java
- INSTANT Premium Drupal Themes
- 3D Printing Designs:Design an SD Card Holder
- Mathematica Data Visualization
- Swift編程實戰(zhàn):iOS應用開發(fā)實例及完整解決方案
- 區(qū)塊鏈原理、設計與應用