Back to Search Start Over

Pointed Questions

Authors :
Hayes, Frank
Source :
Computerworld. February 25, 2002, p66
Publication Year :
2002

Abstract

It's called a proxy hunter. That sounds a little more elegant than 'security hole hunter,' which is really what this kind of software does. Among other things, proxy hunters use […]

Details

Language :
English
ISSN :
00104841
Database :
Gale General OneFile
Journal :
Computerworld
Publication Type :
Periodical
Accession number :
edsgcl.84219300