Centre For Development Of Advanced Computing -CDAC has published Tender For Supply Of Reference Books. Submission Date for this Tender is 28-12-2022. Footwears Tenders in Ranga Reddy Telangana. Bidders can get complete Tender details and download the document.
Sl. No. | Item Description |
1 | Supply of following course material text books |
2 | PRACTICAL MALWARE ANALYSIS THE HANDS- ON GUIDE TO DISSECTING MALICIOUS SOFTWARE |
3 | Cybersecurity Attacks — Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage |
4 | Hands-On Artificial Intelligence for Cybersecurity: Implement smart Al systems for preventing cyber-attacks and detecting threats and network anomalies |
5 | Mastering Windows Security and Hardening: Secure and protectyour Windows environment from intruders, malware attacks, and other cyber threats |
6 | Artificial Intelligence: A Modern Approach |
7 | Machine Learning & Security |
8 | Android Internals: Power User"s View |
9 | Android Internals::DeveIoper"s View |
10 | Hands-On Cryptography with Python |
11 | Security Vulnerabilities In Mobile Operating Systems A Complete Guide |
12 | Application Security for the Android Platform: Processes, Permissions, and Other Safeguards |
13 | Web Application Security: Exploitation and Countermeasures for Modern Web Applications |
14 | Container Security: Fundamental Technology Concepts that Protect Containerized Applications |
15 | Software Architecture:The Hard Parts |
16 | DesigningData-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and MaintainableSystems |
17 | Bug Bounty Bootcamp: The Guide to Finding and ReportingWeb Vulnerabilities |
18 | Black Hat Python, Python Programming for Hackers and Pen testers |
19 | The Hacker Playbook 3: Practical Guide To Penetration Testing |
20 | Hacking Apis: Breaking Web Application Programming Interfaces |
21 | Social Engineering: The Science of Human Hacking |
22 | The Art Of Cyberwarfare: An Investigator"s Guide to Espionage, Ransomware, and Organized Cybercrime |
23 | DesigningSecure Software: A Guide for Developers |
24 | Open Source Intelligence Techniques : Resources for Searching and Analysing Online Information |
25 | Practical Packet Analysis, |
26 | Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK”*Framework and open source tools |
27 | Privilege Escalation Techniques:Learn the art of exploiting Windows and Linux systems |
28 | Research Methodology: Methods And Techniques (Multi Colour Edition) |
29 | Practical BinaryAnalysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly |
30 | Rootkits and Boot kits: Reversing Modern Malware and Next GenerationThreats |
31 | Malware Analysis and Detection Engineering: A ComprehensiveApproach to Detect and Analyze Modern Malware |
32 | Antivirus Bypass Techniques:Learn practical techniques and tactics to combat, bypass, and evade antivirus software |
33 | Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigateWindows malware |
34 | Malware Data Science |
35 | Attacking Network Protocols |
36 | Hands-On Cybersecuritywith Block chain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Block chain |
37 | Mastering Block chain: A deep dive into distributed ledgers, consensusprotocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more |
38 | BPF Performance Tools |
39 | The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto |
40 | Mastering API Architecture:Design, Operate and Evolve API-Based Systems (Grayscale Indian Edition) |
41 | N\astering Block chain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and DecentralizedApplications |
42 | Hands-On Smart Contract Development with Hyper ledger Fabric V2: Building Enterprise Block chainApplications |
43 | Block chainwith Hyper ledger Fabric: Build decentralizedapplicationsusing Hyper ledger Fabric 2 |
Copyright © 2024 · All Rights Reserved. Terms of Usage | Privacy Policy
For Tender Information Services Visit : TenderDetail