Penetration test: differenze tra le versioni
Contenuto cancellato Contenuto aggiunto
m WPCleaner v2.03 - Disambigua corretto un collegamento - Vulnerabilità |
No2 (discussione | contributi) Aggiungo disambiguante: ci sono vari omonimi |
||
Riga 111:
== Bibliografia ==
* Hunt, Edward (2012). [http://www.computer.org/csdl/mags/an/2012/03/man2012030004.html "US Government Computer Penetration Programs and the Implications for Cyberwar"], ''IEEE Annals of the History of Computing'' 34(3)
* [[Johnny Long (informatico)|Long, Johnny]] (2007). ''Google Hacking for Penetration Testers'', [[Elsevier]]
* MacKenzie, Donald (2001). [http://books.google.com/books?id=QiMS8t4V_0cC ''Mechanizing Proof: Computing, Risk, and Trust'']. The MIT Press
* MacKenzie, Donald and Garrell Pottinger (1997). [http://www.computer.org/csdl/mags/an/1997/03/man1997030041.html "Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military"], ''IEEE Annals of the History of Computing'' 19(3)
|