Results
|
1.
|
|
|
2.
|
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text
Publication details: Indianapolis John wiley& Sons 2014
Other title: - Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
3.
|
|
|
4.
|
Ad Hoc Wireless Networks : Architecture and Protocols by
Material type: Text
Publication details: Noida Pearson India Education 2004
Availability: Items available for loan: IIIT Kottayam Central Library (7)Collection, call number: 621.391 MUR/A, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 621.391 MUR/A.
|
|
5.
|
Computer Fundamentals and Programming in C by
Edition: 2nd Ed.
Material type: Text
Publication details: New Delhi Oxford University Press 2016
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.133 C THA/C.
|
|
6.
|
|