Your search returned 3 results.

Not what you expected? Check for suggestions
Sort
Results
Cryptanalysis of number theoretic ciphers

by Wagstaff, Samuel S., Jr.

Series: Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL : CRC Press/Chapman & Hall, 2003Online access: Publisher description Availability: Items available for loan: GIFT University, Library (1) Call number: 005.8 WAG-C.

The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Chichester : Wiley ; John Wiley [distributor], c2011Availability: Items available for loan: GIFT University, Library (1) Call number: 005.80 STU-T.

CEH v9 Certified Ethical hacker Version 9 Study Guide Certified Ethical Hacker version 9 study guide / Sean-Philip Oriyano.

by Oriyano, Sean-Philip [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Availability: Items available for loan: GIFT University, Library (1) Call number: 005.80 PHI-C.

Pages

© 2025 GIFT University | All Rights Reserved