Your search returned 9 results.

Sort
Results
1.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

2.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

3.
Learning kali linux : security testing, penetration testing, and ethical hacking by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Shroff/O'Reilly, ©2018
Availability: Items available for loan: IIITD (1)Call number: 005.8 MES-L . Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 MES-L.
Lists:

4.
The Routledge companion to digital ethnography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Routledge Taylor & Francies Group, ©2017
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 305.8001 HJO-R.

5.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
6.
Wireless networks : multiuser detection in cross-layer design by Series: Information technology--transmission, processing, and storage
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Springer, ©2005
Availability: Items available for loan: IIITD (4)Call number: 621.382 DET-W, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 621.382 DET-W.

7.
Cryptography and network security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2010
Availability: Items available for loan: IIITD (2)Call number: 005.8 FOR-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 FOR-C.

8.
Network security : private communication in a public world by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI, c2002
Availability: Items available for loan: IIITD (4)Call number: 005.8 KAU-N, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAU-N.

9.
Data and computer communications by
Edition: 8th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2007
Availability: Items available for loan: IIITD (2)Call number: 004.6 STA-D, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 004.6 STA-D.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in