The hacker playbook 2 : practical guide to penetration testing
Material type: TextPublication details: CreateSpace, North Charleston : ©2015Description: xiv, 339 p. : ill. ; 24 cmISBN:- 9781512214567
- 005.8 KIM-H
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | Course reserves |
---|---|---|---|---|---|---|---|---|
Reference | IIITD Reference | Computer Science and Engineering | REF 005.8 KIM-H (Browse shelf(Opens below)) | Not for loan | 010402 |
Total holds: 0
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
REF 005.8 KAU-N Network security : private communications in a public world | REF 005.8 KER-D Digital business security development : | REF 005.8 KIA-E Encryption for digital content | REF 005.8 KIM-H The hacker playbook 2 : | REF 005.8 KIM-H The hacker playbook 3 : | REF 005.8 KLE-E Embedded systems security : | REF 005.8 KUR-C Cyber forensics : |
There are no comments on this title.