z-logo
open-access-imgOpen Access
How Attackers Abuse Computing Systems
Author(s) -
David A. Kennel
Publication year - 2015
Language(s) - Uncategorized
Resource type - Reports
DOI - 10.2172/1186036
Subject(s) - exploit , computer security , hacker , computer science , control (management) , risk analysis (engineering) , data science , business , artificial intelligence

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here