Please use this identifier to cite or link to this item: https://sci.ldubgd.edu.ua/jspui/handle/123456789/10035
Full metadata record
DC FieldValueLanguage
dc.contributor.authorБалацька, В.С.-
dc.contributor.authorШабатура, М.М.-
dc.date.accessioned2022-04-14T14:54:22Z-
dc.date.available2022-04-14T14:54:22Z-
dc.date.issued2019-
dc.identifier.urihttps://sci.ldubgd.edu.ua/jspui/handle/123456789/10035-
dc.description.abstractThe increasing volume of attacks on the Internet has increased the demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing.en_US
dc.publisherЛьвівський державний університет безпеки життєдіяльностіen_US
dc.subjectvulnerability scanner, security, cyber crime, ―back door‖, network scannersen_US
dc.titleСканери вразливостей комп'ютерної мережіen_US
Appears in Collections:2019

Files in This Item:
File Description SizeFormat 
Сканери вразливостей комп'ютерної мережі 34-36.pdfТези конференції528.07 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.