نتایج جستجو
Testing ASP.NET Web Applications
Jeff McWherter, Ben Hall, 2009
Testing Web Security: Assessing the Security of Web Sites and Applications
Steven Splaine, 2002
The Open Web Application Security Project (OWASP) Testing Guide v3.0
Matteo Meucci, 2008
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 5 Cookbook: Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5
Willie Pritchett, David De Smet, 2
BackTrack 5 Wireless Penetration Testing Beginner's Guide
Vivek Ramachandran, 2011
Building Virtual Pentesting Labs for Advanced Penetration Testing
Kevin Cardwell, 2014
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits
James S. Tiller, 2011
Cone penetration testing
Paul W. Mayne, National Research Council (U.S.). Transportation Research Board, National Cooperative Highway Research Program, American Association of State Highway and Transportation Officials, United States. Federal Highway Administration, 2007
Cone penetration testing in geotechnical practice
Tom Lunne, Peter Kay Robertson, John J. M. Powell, J. J. M. Powell, 1997
Cone Penetration Testing. Methods and Interpretation
A. C. Meigh (Auth.), 1987
Ethical Hacking and Penetration Testing Guide
Rafay Baloch, 2014
Ethical Hacking and Penetration Testing Guide
Rafay Baloch, 2014
Hacking and Penetration Testing with Low Power Devices
Philip Polstra, 2014
Hacking with Kali: Practical Penetration Testing Techniques
James Broad, Andrew Bindner, 2013
Happy About Global Software Test Automation: A Discussion of Software Testing for Executives
Hung Q. Nguyen, Michael Hackett, Brent K. Whitlock, 2006
