Network forensics : tracking hackers through cyberspace
Material type: TextPublication details: Upper Saddle River, NJ : Prentice Hall, c2012.Description: xxvii, 545 p. : ill. ; 24 cmISBN:- 9780132564717
- 005.8 23 DAV-N
- HV8079.C65 D348 2012
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
Books | IIITD Reference | Computer Science and Engineering | REF 005.8 DAV-N (Browse shelf(Opens below)) | Available | 001777 |
Total holds: 0
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
REF 005.8 CRA-S Security and usability : | REF 005.8 CRA-S Secure multiparty computation and secret sharing | REF 005.8 DAV-I Implementing SSL/TLS using cryptography and PKI | REF 005.8 DAV-N Network forensics : | REF 005.8 DRA-A Android hacker's handbook | REF 005.8 ELI-M Malware, rootkits & botnets | REF 005.8 FER-S Security patterns in practice : |
Includes bibliographical references and index.
There are no comments on this title.