Python for Cybersecurity : using python for cyber offense and defense / Howard E Poston.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781119850649
- QA 76.9.A25 .P846 2022
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
DLSU-D HS Learning Resource Center Circulation | Circulation | QA 76.9.A25 .P846 2022 (Browse shelf(Opens below)) | 001055 | Available | 3SHS2019001055 |
Browsing DLSU-D HS Learning Resource Center shelves, Shelving location: Circulation, Collection: Circulation Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA 76.8.M3 .H362 2003 The Macintosh digital hub | QA 76.8.M3 .K643 2007 Mac maintenance and backups | QA 76.8.R15 .P448 2015 Getting to know the Raspberry Pi | QA 76.9.A25 .P846 2022 Python for Cybersecurity : using python for cyber offense and defense / | QA 76.9.C55 .El28 2014 Mastering exchange server 2013. | QA 76.9.C66 .T226 2014 Technologies, social media and society | QA 76.9.D26 .C816 2019 Database systems : |
There are no comments on this title.
Log in to your account to post a comment.