Software test attacks to break mobile and embedded devices
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9781466575301
- 005.8 23 HAG-S
- QA76.9.A25 H343 2014
- COM051230 | COM053000 | MAT000000
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
IIITD Reference | Computer Science and Engineering | REF 005.8 HAG-S (Browse shelf(Opens below)) | Available | 004394 |
Total holds: 0
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
REF 005.8 GOL-M Modern cryptography, probabilistic proofs, and pseudorandomness | REF 005.8 GRA-S Secure coding : | REF 005.8 GUP-C Cyber unsafe : | REF 005.8 HAG-S Software test attacks to break mobile and embedded devices | REF 005.8 HAW-F Fingerprints : | REF 005.8 HOS-P Python forensics : | REF 005.8 JAK-C Crimeware : |
Includes bibliographical references (pages 319-322) and index.
There are no comments on this title.