Your search returned 4 results.

Sort
Results
1.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

2.
Software test attacks to break mobile and embedded devices by Series: Chapman & Hall/CRC innovations in software engineering and software development series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Taylor & Francis, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 HAG-S.

3.
The hacker playbook 2 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: North Charleston : CreateSpace, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

4.
The hacker playbook 3 : practical guide to penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CreateSpace, ©2018
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KIM-H.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in

Powered by Koha