Young, SusanAitel, Dave2018-10-292018-10-29200420040-8493-0888-7http://196.43.179.3:8080/xmlui/handle/123456789/6981.Foundation material; 2.System and network penetration; 3.Consolidationen-USComputer networks—Security measuresComputer networks—Access controlComputer hackersThe hacker’s handbook : the strategy behind breaking into and defending networksBook