CrossRef Text and Data Mining
Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining.
Penetration Testing and Network Auditing: Linux
Journal of Information Processing Systems. 2015;11(1):104-115.   Published online 2014 November 7    DOI: https://doi.org/10.3745/JIPS.03.0013

Excel Download

Kali Linux – Assuring Security by Penetration Testing
Network Security. 2014;2014(8):4   
Link1 Link2 Link3

WarDriving and Penetration Testing with Linux
WarDriving and Wireless Penetration Testing. 2007;119-152   
Link1 Link2

Wireless Penetration Testing Using a Bootable Linux Distribution
WarDriving and Wireless Penetration Testing. 2007;183-217   
Link1 Link2

Setting Up a Penetration Testing and Network Security Lab
Beginning Ethical Hacking with Kali Linux. 2018;19-40   
Link1

Penetration Testing: Wireless Network Attacks Method on Kali Linux OS
Academic Journal of Nawroz University. 2021;10(1):7-12   
Link1 Link2

Device Driver Auditing
WarDriving and Wireless Penetration Testing. 2007;361-383   
Link1 Link2

Analisa Infrastruktur Jaringan Wireless dan Local Area Network (WLAN) Meggunakan Wireshark Serta Metode Penetration Testing Kali Linux
Journal on Education. 2022;4(4):1470-1476   
Link1 Link2

Penetration Testing
Network Security. 2014;2014(7):4   
Link1 Link2 Link3

Metasploit Penetration Testing Cookbook
Network Security. 2013;2013(11):4   
Link1 Link2 Link3

Social Engineering Penetration Testing
Network Security. 2014;2014(11):4   
Link1 Link2 Link3

This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015.