![Computer security / Cyberwarfare / Computer network security / Computing / Software testing / Metasploit Project / Penetration test / Exploit / Transaction authentication number / Cloud computing Computer security / Cyberwarfare / Computer network security / Computing / Software testing / Metasploit Project / Penetration test / Exploit / Transaction authentication number / Cloud computing](https://www.pdfsearch.io/img/53da7f08068f5ec4de11aa7d171e2590.jpg) Date: 2016-02-21 03:10:51Computer security Cyberwarfare Computer network security Computing Software testing Metasploit Project Penetration test Exploit Transaction authentication number Cloud computing | | POTASSIUM: Penetration Testing as a Service Richard Li, Dallin Abendroth, Xing Lin, Yuankai Guo, Hyun-wook Baek, Eric Eide, Robert Ricci, and Jacobus Van der Merwe Current PentestingAdd to Reading ListSource URL: acmsocc.github.ioDownload Document from Source Website File Size: 832,35 KBShare Document on Facebook
|