Your search returned 4 results.

Sort
Results
1.
Network forensics : tracking hackers through cyberspace by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-N.

2.
Kingpin : how one hacker took over the billion-dollar cybercrime underground by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Broadway Books, ©2011
Availability: Items available for loan: IIITD (1)Call number: 364.16 POU-K.

3.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

4.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in