Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5437
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kennedy, David | - |
dc.contributor.author | Gorman, Jim O | - |
dc.contributor.author | Kearns, Devon | - |
dc.contributor.author | Aharoni, Mati | - |
dc.date.accessioned | 2022-08-01T10:08:02Z | - |
dc.date.available | 2022-08-01T10:08:02Z | - |
dc.date.issued | 2011 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5437 | - |
dc.language.iso | en | en_US |
dc.subject | Metasploit | en_US |
dc.subject | Intelligence Gathering | en_US |
dc.title | Metasploit The Penetration Testers Guide | en_US |
dc.type | eBook | en_US |
Appears in Collections: | Computer Science & Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Metasploit The Penetration Testers Guide by David Kennedy, Jim OGorman, Devon Kearns, Mati Aharoni.pdf | 7.07 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.