Please use this identifier to cite or link to this item:
https://sci.ldubgd.edu.ua/jspui/handle/123456789/10035
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Балацька, В.С. | - |
dc.contributor.author | Шабатура, М.М. | - |
dc.date.accessioned | 2022-04-14T14:54:22Z | - |
dc.date.available | 2022-04-14T14:54:22Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | https://sci.ldubgd.edu.ua/jspui/handle/123456789/10035 | - |
dc.description.abstract | The increasing volume of attacks on the Internet has increased the demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. | en_US |
dc.publisher | Львівський державний університет безпеки життєдіяльності | en_US |
dc.subject | vulnerability scanner, security, cyber crime, ―back door‖, network scanners | en_US |
dc.title | Сканери вразливостей комп'ютерної мережі | en_US |
Appears in Collections: | 2019 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Сканери вразливостей комп'ютерної мережі 34-36.pdf | Тези конференції | 528.07 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.