Automated tools for testing computer system vulnerability / / W. Timothy Polk |
Autore | Polk W. Timothy |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1992 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) | PolkW. Timothy |
Collana | NIST special publication |
Soggetto non controllato |
Change detection
Computer security Configuration review Identification of vulnerabilities Secure audit Trojan horse detection Vulnerability testing |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910711180503321 |
Polk W. Timothy
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1992 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security issues in the database language SQL / / W. Timothy Polk, Lawrence E. Bassham, III |
Autore | Polk W. Timothy |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1993 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
BasshamLawrence E
PolkW. Timothy |
Collana | NIST special publication |
Soggetto non controllato |
Computer security
DBMS Relational database management system SQL |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910711180303321 |
Polk W. Timothy
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1993 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|