Your search returned 3 results.

Sort
Results
1.
Distributed Systems Security :Issues, Processes and Solutions by
Material type: Text Text
Publication details: New Jersey John Wiley & Sons, 2009
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 BEL/D.

2.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text Text
Publication details: Indianapolis John wiley& Sons 2014
Other title:
  • Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (2).

3.
Social Engineering : The Science of Human Hacking by
Edition: 2nd edition.
Material type: Text Text
Publication details: Indianapolis John wiley & Sons 2018
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 HAD/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 HAD/S. Not available: IIIT Kottayam Central Library: Checked out (1).

Pages
IIIT Kottayam Logo       © IIIT Kottayam 2023. All rights reserved.