Your search returned 9 results.

Sort
Results
1.
Digital watermarking and steganography / Ingemar J. Cox ... [et al.]. by
Edition: 2nd ed.
Material type: Text Text
Publication details: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8.

2.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text Text
Publication details: Indianapolis John wiley& Sons 2014
Other title:
  • Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).

3.
Guide to Computer Forensics and Investigations by
Edition: 6th Ed.
Material type: Text Text
Publication details: New Delhi Cengage Learning 2019
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 NEL/G, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 NEL/G.

4.
Social Engineering : The Science of Human Hacking by
Edition: 2nd edition.
Material type: Text Text
Publication details: Indianapolis John wiley & Sons 2018
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 HAD/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 HAD/S.

5.
Practical Malware Analysis : The Hands-On Guide to Dissecting Malicious Software by
Material type: Text Text
Publication details: San Francisco : No Starch Press, ©2012
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.84 SIK/P, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.84 SIK/P. Not available: IIIT Kottayam Central Library: Checked out (1).

6.
Auditing IT Infrastructures for Compliance by Series: Information Systems Security & Assurance Series
Edition: 3rd Ed
Material type: Text Text
Publication details: Newyork Jones&Bartelett Learning 2024
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 JOH/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 JOH/A.

7.
Ethical Hacker's Penetration Testing Guide by
Material type: Text Text
Availability: Items available for loan: IIIT Kottayam Central Library (6)Collection, call number: 005.87 RAK/E, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.87 RAK/E. Not available: IIIT Kottayam Central Library: Checked out (3).

8.
The Ultimate Kali Linux Book : Perform Advanced Penetration Testing using Nmap, Metasploit, Aircrack-ng, and Empire by
Edition: 2nd Ed.
Material type: Text Text
Publication details: Mumbai Packt Publishing 2022
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 SIN/U, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 SIN/U. Not available: IIIT Kottayam Central Library: Checked out (1).

9.
Kali Linux Network Scanning Cookbook :Take Your Penetration Skill to the Next Level by
Edition: 2nd Ed.
Material type: Text Text
Publication details: Mumbai Packt Publishing 2017
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 HIX/K, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 HIX/K. Not available: IIIT Kottayam Central Library: Checked out (2).

Pages
IIIT Kottayam Logo       © IIIT Kottayam 2023. All rights reserved.