Viewing content shared in Subject: Computing & IT
Title | Type | Author | Subject | Last Update | License |
---|---|---|---|---|---|
Penetration Testing - Maintaining Access | Drag the Words | Baljeet Bilkhu | Computing & IT | 5 months ago | U |
Penetration Testing - Scanning | Drag the Words | Baljeet Bilkhu | Computing & IT | 5 months ago | U |
Penetration Testing - Reconnaissance | Drag the Words | Baljeet Bilkhu | Computing & IT | 5 months ago | U |
Introduction to Penetration Testing | Drag the Words | Baljeet Bilkhu | Computing & IT | 5 months ago | U |
Designing with Intent (Interactive Book) | Interactive Book Custom | Jacqueline Anderson | Computing & IT | 5 months ago | CC BY-NC |
Cover Letter Content and Format | Interactive Book | Jenny Peach | Computing & IT | 6 months ago | U |
Informational Interviewing Guide | Column | Jenny Peach | Computing & IT | 6 months ago | CC BY-NC-SA |
Professionalism | Accordion | Jenny Peach | Computing & IT | 6 months ago | U |
AI Developments through the 20th and 21st Centuries | Timeline | Jesslyn Wilkinson | Computing & IT | 6 months ago | CC BY-NC-SA |
Life Cycles | Question Set | Sukhwant Kaur Sagar | Computing & IT | 6 months ago | U |