Array Array
Array
DOI:
https://doi.org/10.33936/isrtic.v1i1.194Abstract
ArrayDownloads
References
[1] K. Labs, (26 de Octubre de 2015), Cyberthreat Real-Time Map. Recuperado el 26.
[2] M. T. Simpson, K. B., Ethical hacking overview, En K. B. Michael T. Simpson, Hands On Ethical Hacking And Network Defense (pág.
[3] C. Hadnagy, Ingeniería social El arte del hacking personal, Pensilvania, Estados Unidos: Anaya multimedia, 2011.
[4] M. Jakobsson, Modeling and preventing phishing attacks, Modeling and Preventing Phishing Attacks, (pág.
[5] M. Alamanni, Kali linux wireless penetration testing essentials, Birminghan B3 2PB, UK: Packt Publishing Ltd. Edward Paul Guillén, José Jaime Navarro Gasca. (2006). Sistema de distribución de claves mediante criptografía. Ciencia e Ingeniería Neogranadina 2.
[6] H. Jara, G. Pacheco, F., Fase de reconocimiento, En H. Jara, & F. G. Pacheco, Ethical Hacking 2. (0).
[7] S. Mendez, L., V. Herrera, A., Etapas del Ethical Hacking, 2013. URL http://repositorio.espe.edu.ec/bitstream/21000/6483/1/T-ESPE-047094.pdf
[8] K. Graves, Maintaining access, En K. Graves, CEH, Official Certified Ethical Hacker (pag. [9] U. of Hong Kong, Protection against hacking technique/tools. a newsletter (2011).
Downloads
Published
Issue
Section
License
Articles submitted to this journal for publication will be released for open access under a Creative Commons Attribution Non-Commercial No Derivative Works licence (http://creativecommons.org/licenses/by-nc-nd/4.0).
The authors retain copyright, and are therefore free to share, copy, distribute, perform and publicly communicate the work under the following conditions: Acknowledge credit for the work specified by the author and indicate if changes were made (you may do so in any reasonable way, but not in a way that suggests that the author endorses your use of his or her work. Do not use the work for commercial purposes. In case of remixing, transformation or development, the modified material may not be distributed.

