Security Assessment : Case Studies for Implementing the NSA IAM Russ Rogers, Greg Miles & Ed Fuller... et. al.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Don Bosco Institute of Technology Library | 005.8 ROG/SEC (Browse shelf(Opens below)) | Available | 6028 |
Browsing Don Bosco Institute of Technology Library shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
No cover image available |
![]() |
||
005.8 PFL/SEC Security in Computing | 005.8 PFL/SEC Security in Computing | 005.8 PFL/SEC Security in Computing | 005.8 ROG/SEC Security Assessment : Case Studies for Implementing the NSA IAM | 005.8 SAR/NET Network and Information Security issues, Challenges adn Research Trends | 005.8 SCA/HAC Hacking exposed | 005.8 SHA/INF Information Security: Principles and Practice |
This book is having Appendix from page no 401 to 414.
There are no comments on this title.