Engineering Machine Tenders

(Select any tender from the list to send an email)
Ref. No #34405783 Central Government/Public Sector Live   GeM Tender

Gem Bids For Linux Kernel Programming Second Edition , Linux Kernel Debugging , Windows Internals Part 1 System Architecture Processes , Windows Internals Part 2 , Windows Kernel Programming , Practical Malware Analysis , Mastering Malware Analysis Second Edition , Malware Development For Ethical Hackers , Malware Data Science , Malware Analysis Techniques , Evasive Malware , Mastering Malware Analysis , Malware Analysis And Detection , Learning Malware Analysis Explore The Concepts Tools , The Art Of Mac Malware The Guide To Analyzing Malicious Software , The Android Malware Handbook Detection And Analysis By Human And , Evading Edr The Definitive Guide To Defeating Endpoint Detection Systems , Learning Ebpf Programming The Linux Kernel For Enhanced Observability , Incident Response Techniques For Ransomware Attacks , Breaking Ransomware , Windows Ransomware Detection And Protection , Ransomware Analysis Knowledge Extraction And Classification For Advanced Cyber Threat Intelligence , Ransomware Revealed A Beginners Guide To Protecting And Recovering From Ransomware Attacks , Attacking Network Protocols , Incident Response For Windows Adapt Effective Strategies , Practical Reverse X86 X64 Arm Windows Kernel Reversing Tools And Obfuscation , Black Hat Python 2nd Edition , Software Reverse Cracking And Counter Measures Tech Today , Rootkits And Bootkits , The Ghidra Book , Practical Binary Analysis , Windows Security Internals A Deep Dive Into Windows , Mastering Linux Security And Hardening Third Edition , Hacking Apis , The Art Of Memory Forensics Detecting Malware And Threats In Windows Linux And Mac Memory , Hacking The Art Of Exploitation 2nd Ed , Practical Threat

Location
Bihar
Due Date
08 May, 2025
Amount
Refer Document