Towards Islamic ethics in professional penetration testing
Frequent technological advances in the field of computing have resulted in a rapid increase in creation of new loopholes in systems. To secure their computing systems, big companies resort to use penetration testing as a solution whereby an external company is hired to evaluate the security of the...
Main Author: | Habaebi, Mohamed Hadi |
---|---|
Format: | Article |
Language: | English |
Published: |
Revelation and Science, IIUM
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33801/ http://irep.iium.edu.my/33801/ http://irep.iium.edu.my/33801/1/97-363-1-PB.pdf |
Similar Items
-
Building textual OLAP cubes using real-time intelligent heterogeneous approach
by: Alzeini, Haytham I. M., et al.
Published: (2018) -
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014) -
A Q-Switched thulium-doped fiber laser with a graphene thin film-based saturable absorber
by: Saidin, Norraida, et al.
Published: (2013) -
Parameters used in gateway selection schemes for Internet connected MANETs: a review
by: Mahmood, Zainab S., et al.
Published: (2015) -
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)