Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5437
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKennedy, David-
dc.contributor.authorGorman, Jim O-
dc.contributor.authorKearns, Devon-
dc.contributor.authorAharoni, Mati-
dc.date.accessioned2022-08-01T10:08:02Z-
dc.date.available2022-08-01T10:08:02Z-
dc.date.issued2011-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5437-
dc.language.isoenen_US
dc.subjectMetasploiten_US
dc.subjectIntelligence Gatheringen_US
dc.titleMetasploit The Penetration Testers Guideen_US
dc.typeeBooken_US
Appears in Collections:Computer Science & Information Technology



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.