Cite

HARVARD Citation

    Shah, D. et al. (2017) Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment. [Online]. Birmingham, [England] : Packt. Available from: http://access.bl.uk/ark:/81055/vdc_100044650142.0x000001
  
Back to record