Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks/ By Donald A. Tevault.-Print.
By: Tevauit, D.A
.
Material type: 


Item type | Current location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
![]() |
IBB Library-Gidan Kwano | QA76.A25.T48 2023 (Browse shelf) | NC 1 | Available | 2342149270 | |
![]() |
IBB Library-Gidan Kwano | QA76.A25.T48 2023 (Browse shelf) | NC 2 | Available | 2342149272 |
Browsing IBB Library-Gidan Kwano Shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.A25.R36 2023 Backtrack 5 Wiereless Penetration Testing: | QA76.A25.R36 2023 Backtrack 5 Wiereless Penetration Testing: | QA76.A25.T48 2023 Mastering Linux Security and Hardening: | QA76.A25.T48 2023 Mastering Linux Security and Hardening: | QA76.A44 2022 An Introduction to Compressible Flow/ | QA76.A44 2022 An Introduction to Compressible Flow/ | QA76.A52 1988 World of computing / |
Include Index
B-48733/JIYA/26/08/2025
There are no comments for this item.