Item type | Current library | Home library | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
Central Science Library | Central Science Library | D65,8(B):81 Q7 (Browse shelf(Opens below)) | Available | SL1602179 |
Browsing Central Science Library shelves Close shelf browser (Hides shelf browser)
D65,8(B):81 Q4;1 TD Software test attacks to break mobile and embedded devices | D65,8(B):81 Q5 TD Ethical hacking and penetration testing guide | D65,8(B):81 Q5 TD Hacking and penetration testing with low power devices | D65,8(B):81 Q7 Penetration testing essentials | D65,8(B):81:92 N5-;1 Software testing in the real world: Improving the process | D65,8(B):82 L3 Theory and application of a bottom-up syntax -directed transtator | D65,8(B):82 M1 Advances in computer system security |
Appendix 319-330p.'; Index 340-340p.
There are no comments on this title.
Log in to your account to post a comment.