Threat and vulnerability penetration testing: Linux
A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, p...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Taiwan Academic Network Management Committee
2014
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/63079/ http://dx.doi.org/10.6138/JIT.2014.15.3.02 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |