Results
|
1.
|
|
|
2.
|
|
|
3.
|
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text
Publication details: Indianapolis John wiley& Sons 2014
Other title: - Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (2).
|
|
4.
|
Guide to Computer Forensics and Investigations by
Edition: 6th Ed.
Material type: Text
Publication details: New Delhi Cengage Learning 2019
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 NEL/G, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 NEL/G.
|
|
5.
|
Social Engineering : The Science of Human Hacking by
Edition: 2nd edition.
Material type: Text
Publication details: Indianapolis John wiley & Sons 2018
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 HAD/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 HAD/S.
|
|
6.
|
|
|
7.
|
|
|
8.
|
Ethical Hacker's Penetration Testing Guide by
Material type: Text
Availability: Items available for loan: IIIT Kottayam Central Library (6)Collection, call number: 005.87 RAK/E, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.87 RAK/E. Not available: IIIT Kottayam Central Library: Checked out (3).
|
|
9.
|
|
|
10.
|
|