The Web Application Hacker's Handbook finding and exploiting security flaws
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Don Bosco Institute of Technology Library | 005.8 STU/THE (Browse shelf(Opens below)) | Available | 19109 | |||
Don Bosco Institute of Technology Library | COMPS | 005.8 STU/THE (Browse shelf(Opens below)) | Available | 18797 |
Browsing Don Bosco Institute of Technology Library shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 PFL/SEC Security in Computing | 005.8 PFL/SEC Security in Computing | 005.8 SHA/INF Information security and cyber laws | 005.8 STU/THE The Web Application Hacker's Handbook finding and exploiting security flaws | 006.3 HAG/NEU Neural network design | 006.3 JAN/NEU Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence | 006.3 JAN/NEU Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence |
There are no comments on this title.