Tender Details Email Tender
Reference # :
Description :
Tenders for Supply of CYBERSECURITY BOOKS, 59 The Fifth Domain Defending Our Country Our Companies and Ourselves in the Age of Cyber Threats , Ethical Hacking and network analysis with wireshark , powershell essential guide , 360 vulnerability assessment with nessuss and wireshark , practical cyber threat intelligence , hands on penetration testing for web applications , Ghost in the Wires , Effective Monitoring and Alerting , Build Your Own Cybersecurity Lab , Web Technologies HTML JAVASCRIPT PHP JAVA JSP ASP dot NET XML and Ajax Black Book HTML Javascript PHP Java Jsp XML and Ajax Black Book , The Art of Deception Controlling the Human Element of Security , Red Team Field Manual RTFM , Data and Goliath , The Art of Invisibility , Blue Team Field Manual BTFM , Purple Team Field manual , Web Security for Developers , The Cybersecurity Playbook How Every Leader and Employee Can Contribute to a Culture of Security , hacking the hacker learn from the experts who take down hackers , Practical Vulnerability Management , Gray Hat C Sharp , Zero Trust and Third Party Risk Reduce the Blast Radius , You CAN Stop Stupid Stopping Losses from Accidental and Malicious Actions , Burp Suite Essentials , Social Engineering The science of human hacking , Cybersecurity Blue Team Toolkit , Black Hat Python , Black Hat Bash , Cybersecurity for Small Networks , the Hacker Playbook 3 Practical Guide to Penetration Testing , Applied Incident Response , Hands On Hacking Become an Expert at Next Gen Penetration Testing and Purple Teaming , Intrusion Detection Honeypots , Ethical Hacking A Hands on Introduction to Breaking In , Penetration Testing A Hands On Introduction to Hacking , Practical Binary Analysis , The Ghidra Book , Violent Python A Cookbook for Hackers Forensic Analysts, Penetration Tester and Security Engineers , The hardware hacking handbook , the CISO Evolution Business Knowledge for Cybersecurity Executives , The Web Application Hackers Handbook Finding and Exploiting Security Flaws , Microsoft Defender for Endpoint in Depth , Linux Firewalls Attack Detection and Response with iptables psad and fwsnort , Hacking APIs Breaking Web Application Programming Interfaces , Evading EDR The Definitive Guide to Defeating Endpoint Detection Systems , Mastering Windows Security and Hardening Second Edition , COMPTIA Security Plus Study Guide , COMPTIA CySA Plus Study Guide Exam CS0 003 3rd Ed , 0Auth 2 in Action , Threat Modeling Designing for Security , Network Security Bible , Effective Threat Investigations for SOC Analysts , ISACA Certified in Risk and Information Systems Control CRISC Exam Guide , Burp Suite Cookbook Second Edition , Linux Plus Study Guide COMPTIA , Programming Rust , Practical Threat Detection Engineering , Developing Cybersecurity Programs and Policies , Cyber Threat Intelligence
Key Values
Value :
Doc. Cost :
Key Dates
Due date :
04 Mar, 2024
Location :
Jammu And Kashmir
Get More Info