How To Cheat At Configuring Open Source Security Tools
Publication details: "Syngress, New Delhi" 2008Description: 512ISBN:- 9788131212455
- 5.8 ALD/BUR
Item type | Current library | Collection | Call number | Status | Notes | Barcode | |
---|---|---|---|---|---|---|---|
Book | St. Francis Institute of Management and Research | MMS | 5.8 ALD/BUR (Browse shelf(Opens below)) | Available | Location A 3.2 | 008192 |
Browsing St. Francis Institute of Management and Research shelves, Collection: MMS Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
5.754 ZAC Networking | 5.757 LET/LAG Object - Oriented Software Engineering | 5.7575 BEN/MCR Object - Oriented Systems Analysis And Design | 5.8 ALD/BUR How To Cheat At Configuring Open Source Security Tools | 5.8 ERI Hacking | 5.8 FAD Ethical Hacking Guide To Corporate Security | 5.8 FAD Unofficial Guide To Ethical Hacking |
ENGLISH
There are no comments on this title.
Log in to your account to post a comment.