Results 311 to 320 of about 14,954,259 (382)
Some of the next articles are maybe not open access.

Penetration Testing

To identify system vulnerabilities, pen testing is essential for cybersecurity. Phases of preparation, reconnaissance, scanning, exploitation, and reporting are all involved. Every phase makes use of tools such as Nmap, Nessus, and Metasploit. To guarantee system, network, and data security, businesses should conduct pen tests regularly using skilled ...
Bradley Fowler, Bruce G. Chaundy
  +5 more sources

Transmission Expansion Planning Test System for AC/DC Hybrid Grid With High Variable Renewable Energy Penetration

IEEE Transactions on Power Systems, 2020
Test systems are important tools and benchmark for power system research. Currently, there is a lack of standard test systems for modern transmission expansion planning (TEP) research, especially under high variable renewable energy (VRE) penetrations ...
Zhenyu Zhuo   +6 more
semanticscholar   +1 more source

Penetration Testing

2020
Ravi Das, Greg Johnson
openaire   +1 more source

Penetration Testing

2010
Stacy Prowell, Rob Kraus, Mike Borkin
openaire   +2 more sources

Instrumented Becker Penetration Test. I: Equipment, Operation, and Performance

, 2017
J. DeJong   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy