Wireless Security and Privacy : Best Practices and Design Techniques / Tara M. Swaminatha, Charles R. Elden.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Don Bosco Institute of Technology Library | 005.8 SWA/WIR (Browse shelf(Opens below)) | Available | 4205 |
Browsing Don Bosco Institute of Technology Library shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8/STU/HAC Hacking Exposed | 005.8 STU/THE The Web Application Hacker's Handbook finding and exploiting security flaws | 005.8 STU/THE The Web Application Hacker's Handbook finding and exploiting security flaws | 005.8 SWA/WIR Wireless Security and Privacy : Best Practices and Design Techniques / | 005.8 TIT/CIS CCISSP: Certified Information Systems Security Professional Study Guide | 005.8 WHI/PRI Principles of Information Security | 005.8 WHI/PRI Principal of Information Security |
This book is having Bibliography on page no 249.
There are no comments on this title.