ETHICAL HACKING: TECHNIQUES, TOOLS, AND COUNTERMEASURES
Material type:
- 978.1-284-24899-9
- TK5105.59 .S65 2024
Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Kisii University Library On Display | Science & Technology | TK5105.59 .S65 2024 (Browse shelf(Opens below)) | C.1 | Available | 000000019232 | |
![]() |
Kisii University Library On Display | Science & Technology | TK5105.59 .S65 2024 (Browse shelf(Opens below)) | C.2 | Available | 000000019233 |
Browsing Kisii University Library shelves, Shelving location: On Display, Collection: Science & Technology Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||||
TK 5105.59 .O74 2004 ETHEREAL PACKET SNIFFING | TK 5105.59 .S55 2007 DR.TOM SHINDER'S ISA SERVER 2006: MIGRATION GUIDE | TK5105.59 .S65 2024 ETHICAL HACKING: TECHNIQUES, TOOLS, AND COUNTERMEASURES | TK5105.59 .S65 2024 ETHICAL HACKING: TECHNIQUES, TOOLS, AND COUNTERMEASURES | TK 5105.59 .S73 1999 CRYPTOGRAPHY AND NETWORK SECURITY, PRINCIPLES AND PRACTICE | TK 5105.59 .S73 1999 CRYPTOGRAPHY AND NETWORK SECURITY, PRINCIPLES AND PRACTICE | TK 5105.59 .S73 2011 CRYPTOGRAPHY AND NETWORK SECURITY |
INCLUDES INDEX
There are no comments on this title.
Log in to your account to post a comment.