Amazon cover image
Image from Amazon.com

Network forensics : tracking hackers through cyberspace

By: Contributor(s): Material type: TextTextPublication details: Upper Saddle River, NJ : Prentice Hall, c2012.Description: xxvii, 545 p. : ill. ; 24 cmISBN:
  • 9780132564717
Subject(s): DDC classification:
  • 005.8 23 DAV-N
LOC classification:
  • HV8079.C65 D348 2012
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Books Books IIITD Reference Computer Science and Engineering REF 005.8 DAV-N (Browse shelf(Opens below)) Available 001777
Total holds: 0
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
REF 005.8 CRA-S Security and usability : REF 005.8 CRA-S Secure multiparty computation and secret sharing REF 005.8 DAV-I Implementing SSL/TLS using cryptography and PKI REF 005.8 DAV-N Network forensics : REF 005.8 DRA-A Android hacker's handbook REF 005.8 ELI-M Malware, rootkits & botnets REF 005.8 FER-S Security patterns in practice :

Includes bibliographical references and index.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in