Skip to main content
AVIT Central Library
Your cart is empty.
Cart
Lists
Public lists
Law books in AVIT lib
A Text Book on Environmental Pollution and Control
View all
Your lists
Log in to create your own lists
Log in to your account
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Libraries
Log in to your account
×
Login:
Password:
Forgot your password?
Home
Details for:
Practical Cyber Threat Intelligence: Gather Process and Analyze Threat Actor Motives Targets and Attacks with Cyber Intelligence Practices
Normal view
MARC view
ISBD view
Practical Cyber Threat Intelligence: Gather Process and Analyze Threat Actor Motives Targets and Attacks with Cyber Intelligence Practices
Ozkaya Erdal
By:
Ozkaya Erdal
|
Computer Science
Language:
English
Publication details:
New Delhi
BPB Publications
2023
Edition:
2022
Description:
428p
ISBN:
9789355510297
Subject(s):
Computer Science
DDC classification:
005.8
Tags from this library:
No tags from this library for this title.
Log in to add tags.
Star ratings
1
2
3
4
5
Cancel rating
.
Average rating: 0.0 (0 votes)
Holdings
( 1 )
Comments ( 0 )
Holdings
Item type
Current library
Collection
Call number
Status
Notes
Date due
Barcode
Books
AVIT Central Library
Purchased
005.8 OZK-P (
Browse shelf
(Opens below)
)
Available
EE/2024/CRB/51
42168
Browsing AVIT Central Library shelves, Collection: Purchased
Close shelf browser
(Hides shelf browser)
Previous
Next
005.8 OJH-B
Beginners Guide to Ethical Hacking and Cyber Security
005.8 OJH-B
Beginners Guide to Ethical Hacking and Cyber Security
005.8 OJH-B
Beginners Guide to Ethical Hacking and Cyber Security
005.8 OZK-P
Practical Cyber Threat Intelligence: Gather Process and Analyze Threat Actor Motives Targets and Attacks with Cyber Intelligence Practices
005.80 RAK-E
Ethical Hackers Penetration Testing Guide:Vulnerability Assessment and Attack Simulation on Web Mobile Network Services and Wireless Networks
005.80 RAK-E
Ethical Hackers Penetration Testing Guide:Vulnerability Assessment and Attack Simulation on Web Mobile Network Services and Wireless Networks
005.8 RAM-I
Internet if Things: Architecture Implementation and Security
There are no comments on this title.
Log in to your account
to post a comment.
Print
Add to your cart
(remove)
Suggest for purchase
Save record
BIBTEX
Dublin Core
MARCXML
MARC (non-Unicode/MARC-8)
MARC (Unicode/UTF-8)
MARC (Unicode/UTF-8, Standard)
MODS (XML)
RIS
ISBD
More searches
Search for this title in:
Other Libraries (WorldCat)
Other Databases (Google Scholar)
Online Stores (Bookfinder.com)
Open Library (openlibrary.org)
Exporting to Dublin Core...
×
Simple DC-RDF
OAI-DC
SRW-DC
There are no comments on this title.