Please use this identifier to cite or link to this item:
https://sci.ldubgd.edu.ua/jspui/handle/123456789/6748
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Шабатура, М.М. | - |
dc.contributor.author | Балацька, В.С. | - |
dc.date.accessioned | 2020-02-26T08:05:39Z | - |
dc.date.available | 2020-02-26T08:05:39Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/6748 | - |
dc.description.abstract | The increasing volume of attacks on the Internet has increased the demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. | uk |
dc.publisher | Львівський державний університет безпеки життєдіяльності | uk |
dc.subject | Сканер вразливості, безпека, кіберзлочин, «зворотні двері», мережеві сканери. | uk |
dc.title | Сканери вразливостей комп'ютерної мережі | uk |
Appears in Collections: | 2019 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Захист інформації (збірник) остаточний друк.pdf | Тези | 4.81 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.