}

Tender For Supply Of Reference Books, Ranga Reddy-Telangana

Centre For Development Of Advanced Computing -CDAC has published Tender For Supply Of Reference Books. Submission Date for this Tender is 28-12-2022. Footwears Tenders in Ranga Reddy Telangana. Bidders can get complete Tender details and download the document.




Tender Notice

35388928
Tender For Supply Of Reference Books
Open Tender
Indian
Telangana
Ranga Reddy
28-12-2022

Tender Details

Supply Of Reference Books , Supply Of Following Course Material Text Books , Practical Malware Analysis The Hands- On Guide To Dissecting Malicious Software , Cybersecurity Attacks — Red Team Strategies: A Practical Guide To Building A Penetration Testing Program Having Homefield Advantage , Hands-On Artificial Intelligence For Cybersecurity: Implement Smart Al Systems For Preventing Cyber-Attacks And Detecting Threats And Network Anomalies , Mastering Windows Security And Hardening: Secure And Protectyour Windows Environment From Intruders, Malware Attacks, And Other Cyber Threats , Artificial Intelligence: A Modern Approach , Machine Learning & Security , Android Internals: Power Users View , Android Internals::Deveiopers View , Hands-On Cryptography With Python , Security Vulnerabilities In Mobile Operating Systems A Complete Guide , Application Security For The Android Platform: Processes, Permissions, And Other Safeguards , Web Application Security: Exploitation And Countermeasures For Modern Web Applications , Container Security: Fundamental Technology Concepts That Protect Containerized Applications , Software Architecture:The Hard Parts , Designingdata-Intensive Applications: The Big Ideas Behind Reliable, Scalable, And Maintainablesystems , Bug Bounty Bootcamp: The Guide To Finding And Reportingweb Vulnerabilities , Black Hat Python, Python Programming For Hackers And Pen Testers , The Hacker Playbook 3: Practical Guide To Penetration Testing , Hacking Apis: Breaking Web Application Programming Interfaces , Social Engineering: The Science Of Human Hacking , The Art Of Cyberwarfare: An Investigators Guide To Espionage, Ransomware, And Organized Cybercrime , Designingsecure Software: A Guide For Developers , Open Source Intelligence Techniques : Resources For Searching And Analysing Online Information , Practical Packet Analysis, , Practical Threat Intelligence And Data-Driven Threat Hunting: A Hands-On Guide To Threat Hunting With The Att&Ck”*Framework And Open Source Tools , Privilege Escalation Techniques:Learn The Art Of Exploiting Windows And Linux Systems , Research Methodology: Methods And Techniques (Multi Colour Edition) , Practical Binaryanalysis: Build Your Own Linux Tools For Binary Instrumentation, Analysis, And Disassembly , Rootkits And Boot Kits: Reversing Modern Malware And Next Generationthreats , Malware Analysis And Detection Engineering: A Comprehensiveapproach To Detect And Analyze Modern Malware , Antivirus Bypass Techniques:Learn Practical Techniques And Tactics To Combat, Bypass, And Evade Antivirus Software , Learning Malware Analysis: Explore The Concepts, Tools, And Techniques To Analyze And Investigatewindows Malware , Malware Data Science , Attacking Network Protocols , Hands-On Cybersecuritywith Block Chain: Implement Ddos Protection, Pki-Based Identity, 2Fa, And Dns Security Using Block Chain , Mastering Block Chain: A Deep Dive Into Distributed Ledgers, Consensusprotocols, Smart Contracts, Dapps, Cryptocurrencies, Ethereum, And More , Bpf Performance Tools , The Book Of Satoshi: The Collected Writings Of Bitcoin Creator Satoshi Nakamoto , Mastering Api Architecture:Design, Operate And Evolve Api-Based Systems (Grayscale Indian Edition) , NAstering Block Chain: Unlocking The Power Of Cryptocurrencies, Smart Contracts, And Decentralizedapplications , Hands-On Smart Contract Development With Hyper Ledger Fabric V2: Building Enterprise Block Chainapplications , Block Chainwith Hyper Ledger Fabric: Build Decentralizedapplicationsusing Hyper Ledger Fabric 2

Key Value

Document Fees
Refer document
EMD
Refer document
Tender Value
Refer document

BOQ Items

Name of Work: Supply of Course Material Text Books
Sl. No. Item Description
1Supply of following course material text books
2PRACTICAL MALWARE ANALYSIS THE HANDS- ON GUIDE TO DISSECTING MALICIOUS SOFTWARE
3Cybersecurity Attacks — Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage
4Hands-On Artificial Intelligence for Cybersecurity: Implement smart Al systems for preventing cyber-attacks and detecting threats and network anomalies
5Mastering Windows Security and Hardening: Secure and protectyour Windows environment from intruders, malware attacks, and other cyber threats
6Artificial Intelligence: A Modern Approach
7Machine Learning & Security
8Android Internals: Power User"s View
9Android Internals::DeveIoper"s View
10Hands-On Cryptography with Python
11Security Vulnerabilities In Mobile Operating Systems A Complete Guide
12Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
13Web Application Security: Exploitation and Countermeasures for Modern Web Applications
14Container Security: Fundamental Technology Concepts that Protect Containerized Applications
15Software Architecture:The Hard Parts
16DesigningData-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and MaintainableSystems
17Bug Bounty Bootcamp: The Guide to Finding and ReportingWeb Vulnerabilities
18Black Hat Python, Python Programming for Hackers and Pen testers
19The Hacker Playbook 3: Practical Guide To Penetration Testing
20Hacking Apis: Breaking Web Application Programming Interfaces
21Social Engineering: The Science of Human Hacking
22The Art Of Cyberwarfare: An Investigator"s Guide to Espionage, Ransomware, and Organized Cybercrime
23DesigningSecure Software: A Guide for Developers
24Open Source Intelligence Techniques : Resources for Searching and Analysing Online Information
25Practical Packet Analysis,
26Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK”*Framework and open source tools
27Privilege Escalation Techniques:Learn the art of exploiting Windows and Linux systems
28Research Methodology: Methods And Techniques (Multi Colour Edition)
29Practical BinaryAnalysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
30Rootkits and Boot kits: Reversing Modern Malware and Next GenerationThreats
31Malware Analysis and Detection Engineering: A ComprehensiveApproach to Detect and Analyze Modern Malware
32Antivirus Bypass Techniques:Learn practical techniques and tactics to combat, bypass, and evade antivirus software
33Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigateWindows malware
34Malware Data Science
35Attacking Network Protocols
36Hands-On Cybersecuritywith Block chain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Block chain
37Mastering Block chain: A deep dive into distributed ledgers, consensusprotocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more
38BPF Performance Tools
39The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto
40Mastering API Architecture:Design, Operate and Evolve API-Based Systems (Grayscale Indian Edition)
41N\astering Block chain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and DecentralizedApplications
42Hands-On Smart Contract Development with Hyper ledger Fabric V2: Building Enterprise Block chainApplications
43Block chainwith Hyper ledger Fabric: Build decentralizedapplicationsusing Hyper ledger Fabric 2
Disclaimer :
We takes all possible care for accurate & authentic tender information, however Users are requested to refer Original source of Tender Notice / Tender Document published by Tender Issuing Agency before taking any call regarding this tender.
Tell us about your Product / Services,
We will Find Tenders for you

Copyright © 2024 · All Rights Reserved. Terms of Usage | Privacy Policy

For Tender Information Services Visit : TenderDetail