Writing secure code Practical strategies and proven techniques for building secure applications in a networked world
Material type: TextPublication details: WP PUBLISHERS & DISTRIBUTORS BANGLORE 2002Description: xv, 477 PAPER BINDINGISBN:- 8178530589
- 005.8 HOW-P2
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | SSCBS Library | General Books | 005.8 HOW-P2 (Browse shelf(Opens below)) | Available | 9655 |
Browsing SSCBS Library shelves, Collection: General Books Close shelf browser (Hides shelf browser)
005.8 HAR-Q8 Gray hat hacking : The ethical hacker's handbook | 005.8 HAR-Q8 Gray hat hacking : The ethical hacker's handbook | 005.8 HAR-Q8 Gray hat hacking : The ethical hacker's handbook | 005.8 HOW-P2 Writing secure code | 005.8 JAI-Q7 Digital forensic : The fascinating world of digital evidences | 005.8 JAI-Q7 Digital forensic : The fascinating world of digital evidences | 005.8 JAI-Q7 Digital forensic : The fascinating world of digital evidences |
There are no comments on this title.
Log in to your account to post a comment.