On the review and setup of security audit using Kali Linux
The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the utilization of penetration testing, vulne...
Main Authors: | Gunawan, Teddy Surya, Lim, Muhammad Kasim, Zulkurnain, Nurul Fariza, Kartiwi, Mira |
---|---|
Format: | Article |
Language: | English English |
Published: |
IAES
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/63554/ http://irep.iium.edu.my/63554/ http://irep.iium.edu.my/63554/ http://irep.iium.edu.my/63554/7/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux_SCOPUS.pdf http://irep.iium.edu.my/63554/8/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux.pdf |
Similar Items
-
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
On the comparison of line spectral frequencies and mel-frequency cepstral coefficients using feedforward neural network for language identification
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
On the use of edge features and exponential decaying number of nodes in the hidden layers for handwritten signature recognition
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
A review on emotion recognition algorithms using speech analysis
by: Gunawan, Teddy Surya, et al.
Published: (2018)