Return to Article Details Vulnerability assessment and penetration testing in the military and IHL context Download Download PDF