Please use this identifier to cite or link to this item: https://sci.ldubgd.edu.ua/jspui/handle/123456789/6126
Full metadata record
DC FieldValueLanguage
dc.contributor.authorШабатура, М.М.-
dc.contributor.authorБалацька, В.-
dc.date.accessioned2019-12-02T12:51:18Z-
dc.date.available2019-12-02T12:51:18Z-
dc.date.issued2019-
dc.identifier.urihttp://hdl.handle.net/123456789/6126-
dc.description.abstractThe increasing volume of attacks on the Internet has increased the demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing.uk
dc.publisherЛьвівський державний університет безпеки життєдіяльностіuk
dc.subjectСканер вразливості, безпека, кіберзлочин, «зворотні двері», мережеві сканери.uk
dc.titleСканери вразливостей комп'ютерної мережіuk
Appears in Collections:2019

Files in This Item:
File Description SizeFormat 
Захист інформації (збірник) остаточний друк.pdf4.81 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.