The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.
How to cite (IEEE):
D. Satria, A. Alanda, A. Erianda, & D. Prayama
"Network Security Assessment Using Internal Network Penetration Testing Methodology," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4-2, , pp. 360 - 365, Oct. 2018.
https://doi.org/10.30630/joiv.2.4-2.190
How to cite (APA):
Satria, D., Alanda, A., Erianda, A., & Prayama, D.
(2018).
Network Security Assessment Using Internal Network Penetration Testing Methodology.
JOIV : International Journal on Informatics Visualization, 2(4-2), 360 - 365.
https://doi.org/10.30630/joiv.2.4-2.190
How to cite (Chicago):
Satria, Deni, Alanda, Alde, Erianda, Aldo, AND Prayama, Deddy.
"Network Security Assessment Using Internal Network Penetration Testing Methodology" JOIV : International Journal on Informatics Visualization [Online], Volume 2 Number 4-2 (6 October 2018)
https://doi.org/10.30630/joiv.2.4-2.190
How to cite (Vancouver):
Satria D, Alanda A, Erianda A, & Prayama D .
Network Security Assessment Using Internal Network Penetration Testing Methodology.
JOIV : International Journal on Informatics Visualization [Online]. 2018 Oct;
2(4-2):360 - 365.
https://doi.org/10.30630/joiv.2.4-2.190
How to cite (Harvard):
Satria, D., Alanda, A., Erianda, A., & Prayama, D.
,2018.
Network Security Assessment Using Internal Network Penetration Testing Methodology.
JOIV : International Journal on Informatics Visualization, [Online] 2(4-2), pp. 360 - 365.
https://doi.org/10.30630/joiv.2.4-2.190
How to cite (MLA8):
Satria, Deni, Alde Alanda, Aldo Erianda, & Deddy Prayama.
"Network Security Assessment Using Internal Network Penetration Testing Methodology." JOIV : International Journal on Informatics Visualization [Online], 2.4-2 (2018): 360 - 365. Web. 5 Oct. 2024
, https://doi.org/10.30630/joiv.2.4-2.190
BibTex Citation Data :
@article{