Chained exploits : advanced hacking attacks from start to finish
Publication details: London ; Addison- Wesley ; 2009 Description: 279 pISBN: 978-0321498816DDC classification: 005.8 WHIItem type | Current library | Call number | URL | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Books | Library and Information Resource Centre | 005.8 WHI (Browse shelf(Opens below)) | Online Resource | 1 | Available | 8429 | |
Books | Library and Information Resource Centre | 005.8 WHI (Browse shelf(Opens below)) | Online Resource | 1 | Available | 8430 |
Browsing Library and Information Resource Centre shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | |||||||
005.8 VLA Network security firewalls and vpns lab manual | 005.8 WEI Auditing it infrastructures for compliance | 005.8 WHI Chained exploits : | 005.8 WHI Chained exploits : | 005.81 CON Principles of computer security (Acc. No. 6289) | 005.81 CON Principles of computer security (Acc. No. 6289) | 005.82 MCG Xml by example : |
There are no comments on this title.