Hands-On Ethical Hacking and Network Defense
Publication details: Cengage Learning India Private Limited: Delhi, 2021Edition: 4Description: 366ISBN:- 9789355738790
- 005.8 SIM
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E15794 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E15795 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Checked out | 17/05/2025 | E15791 | ||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E15792 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Not for loan | E15787 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Not for loan | E15788 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E15793 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E15796 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E15789 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E15790 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14313 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14314 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14310 | |||
![]() |
ACED SC & ST Book Bank - Mezzanine Floor | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14311 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14309 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14315 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14308 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Checked out | 17/08/2024 | E14312 | ||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14317 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E14316 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Available | E11813 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIM (Browse shelf(Opens below)) | Not for loan | E11812 |
Browsing ACED shelves, Collection: Computer Science and Information Technology Close shelf browser (Hides shelf browser)
005.8 SIM Hands-On Ethical Hacking and Network Defense | 005.8 SIM Hands-On Ethical Hacking and Network Defense | 005.8 SIM Hands-On Ethical Hacking and Network Defense | 005.8 SIM Hands-On Ethical Hacking and Network Defense | 005.8 SIM Hands-On Ethical Hacking and Network Defense | 005.8 SIM Hands-On Ethical Hacking and Network Defense | 005.8 SIN Software security |
Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking.
There are no comments on this title.