Results
|
|
Network security assessment by McNab, Chris. Material type: Text Publication details: Mumbai Shroff Publishers 2004Availability: Items available for loan: 1 Call number: 005.8 M50N.
|
|
|
Infosec career hacking by Bayles, Aaron W. Material type: Text Publication details: Mumbai Shroff Publishers 2005Availability: Items available for loan: 1 Call number: 005.8 B34I.
|
|
|
Security warrior by Peikari, Cyrus. Material type: Text Publication details: Mumbai Shroff Publishers 2004Availability: Items available for loan: 1 Call number: 005.8 P32S.
|
|
|
|
|
|
|
|
|
Honeypots tracking hackers by Spitzner, Lance. Material type: Text Publication details: Boston Addison-Wesley 2003Availability: Items available for loan: 1 Call number: 005.8 S65H.
|
|
|
|
|
|
Computer and intrusion forensics by Mohay, George. Material type: Text Publication details: Boston Artech House 2003Availability: Items available for loan: 1 Call number: 005.8 M70C.
|
|
|
|
|
|
Google hacking for penetration testers by Long, Johnny. Material type: Text Publication details: Mumbai Shroff Publishers 2005Availability: Items available for loan: 2 Call number: 005.8 L76G, ...
|
|
|
|
|
|
Digital identity by Windley, Phillip J. Material type: Text Publication details: Mumbai Shroff Publishers 2005Availability: Items available for loan: 1 Call number: 005.8 W61D.
|
|
|
Web security,privacy and commerce by Garfinkel, Simson. Material type: Text Publication details: Mumbai Shroff Publishers and Distributors 2002Availability: Items available for loan: 1 Call number: 005.8 G18W.
|
|
|
Hardening network infrastructure by Noonan, Wesley J. Material type: Text Publication details: New Delhi Tata McGraw-Hill Publishing 2004Availability: Items available for loan: 1 Call number: 005.8 N70H.
|
|
|
Computer network security by Kizza, Joseph M. Material type: Text Publication details: New York Springer 2005Availability: Items available for loan: 1 Call number: 005.8 K80C.
|
|
|
|
|
|
Secure internet practices by Mcbride, Patrick. Material type: Text Publication details: Boca Raton Auerbach Publishers 2002Availability: Items available for loan: 1 Call number: 005.8 M50S.
|
|
|
|
|
|
Managing cyber threats by Kumar, Vipin Ed. Material type: Text Publication details: New York Springer Science 2005Availability: Items available for loan: 1 Call number: 005.8 K98M.
|
|
|
Practical intrusion detection handbook by Protector, Paul E. Material type: Text Publication details: Upper Saddle River Prentice Hall 2001Availability: Items available for loan: 1 Call number: 005.8 P87P.
|