Amazon cover image
Image from Amazon.com

The hacker playbook 3 : practical guide to penetration testing

By: Material type: TextTextPublication details: CreateSpace, New York : ©2018Description: ix, 271 p. : ill. ; 25 cmISBN:
  • 9781980901754
Subject(s): DDC classification:
  • 005.8 KIM-H
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds Course reserves
Reference Reference IIITD Reference Computer Science and Engineering REF 005.8 KIM-H (Browse shelf(Opens below)) Not for loan 010436

Security Engineering WNT

Networks and System Security II UG/PG (REST) WNT24

Total holds: 0
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
REF 005.8 KER-D Digital business security development : REF 005.8 KIA-E Encryption for digital content REF 005.8 KIM-H The hacker playbook 2 : REF 005.8 KIM-H The hacker playbook 3 : REF 005.8 KLE-E Embedded systems security : REF 005.8 KUR-C Cyber forensics : REF 005.8 LEE-A Advances in fingerprint technology

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in