Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/6417Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jim O'Gorman, David Kennedy | - |
| dc.date.accessioned | 2022-02-10T04:40:15Z | - |
| dc.date.available | 2022-02-10T04:40:15Z | - |
| dc.date.issued | 2011 | - |
| dc.identifier.isbn | 159327288X | - |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/6417 | - |
| dc.language.iso | en | en_US |
| dc.publisher | No Starch Press | en_US |
| dc.title | Metasploit: The Penetration Tester's Guide | en_US |
| dc.type | Book | en_US |
| Appears in Collections: | 0.1 Data Processing & Computer Science | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Metasploit The Penetration Tester's Guide.pdf | 375.33 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.