57 results on '"Sheikh Ahmed"'
Search Results
2. Working with Linux: Part 1
3. Networking Fundamentals
4. Essential System Services
5. Users and Groups
6. Hardware and Process Settings
7. Introduction to Linux and Linux Certification
8. Working with Linux: Part 2
9. Installing Linux
10. Security
11. Desktop and User Interface
12. CompTIA Linux+ Certification Companion
13. Boot Process and Shutdown
14. Administrative Tasks
15. Shells, Scripts, and Data Management
16. Software Installation
17. Eyelid Tumors of Apocrine, Eccrine, and Pilar Origins
18. Footprinting and Reconnaissance/Scanning Networks
19. SQL Injections
20. Evading Intrusion Detection Systems, Firewalls, and Honeypots
21. Sniffers and Social Engineering
22. Enumeration
23. Introduction to Ethical Hacking
24. Denial of Service
25. Cryptography
26. Buffer Overflow
27. Penetration Testing
28. Hacking Webservers
29. Contributors
30. Catalytic carbon materials from biomass
31. Hacking Wireless Networks
32. Certified Ethical Hacker (CEH) Preparation Guide
33. System Hacking
34. Hacking Web Applications
35. Trojans, Backdoors, Viruses, and Worms
36. Network Fundamentals and Infrastructure Security
37. General Security Concepts and Trends
38. Risk Management
39. Attacks
40. Physical Security
41. Email, Instant Messaging, and Web Components
42. Role of People in Security—Operational and Organizational Security
43. Public Key Infrastructure
44. Eyelid Tumors of Apocrine, Eccrine, and Pilar Origins
45. CompTIA Security+ Certification Study Guide
46. Baseline and Secure Software Development
47. Network Attacks
48. Wireless and Intrusion Detection System Network Security
49. Access Control and Privilege Management
50. Forensics, Legal Issues, and Privacy
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.