Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/16315Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, Peter | - |
| dc.date.accessioned | 2022-07-01T03:49:31Z | - |
| dc.date.available | 2022-07-01T03:49:31Z | - |
| dc.date.issued | 2018 | - |
| dc.identifier.isbn | 1980901759 | - |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/16315 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Independently Published | en_US |
| dc.title | The Hacker Playbook 3: Practical Guide To Penetration Testing | en_US |
| dc.type | Book | en_US |
| Appears in Collections: | 0.2 Programming Languages | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| The Hacker Playbook 3 Practical Guide To Penetration Testing.pdf | 416.51 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.