Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/22074Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, Peter | - |
| dc.date.accessioned | 2022-11-22T06:47:43Z | - |
| dc.date.available | 2022-11-22T06:47:43Z | - |
| dc.date.issued | 2018 | - |
| dc.identifier.isbn | 1980901759 | - |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/22074 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Independently Published | en_US |
| dc.title | The Hackers play book 3 practical guide to Penetration tesing | en_US |
| dc.type | Book | en_US |
| Appears in Collections: | 0.1 Data Processing & Computer Science | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| The Hacker Playbook 3 Practical Guide To Penetration Testing.pdf | 416.51 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.