Web Analytics Made Easy - StatCounter

Tender for Procurement Of Books - Intelligence And Data Driven Threat Hunting , Learn Computer Forensics Second Edition , Practical Digital Forensics , Practical Cyber Forensics An Incident Based Approach To Forensic Investigations , Ethical Password Cracking Decode Passwords , Automating Security Detection Engineering , Practical Linux Forensics A Guide For Digital Investigators , Implementing Reverse Engineering , Practical Mobile Forensics Fourth Edition , Digital Forensics And Incident Response Third Edition , Digital Forensics And Incident Response A Practical Guide To Using Kali Linux For Cyber Investigations , Handson Network Forensics , Mastering Network Forensics Practical Approach To Investigating And Defending Against Network Attacks , Fundamentals Of Network Forensics A Research Perspective Computer Communications And Networks , Multimedia Forensics Advances In Computer Vision And Pattern Recognition , Mastering Windows Network Forensics And Investigation , Digital Forensics With Kali Linux Third Edition Enhance , Learning By Practicing Mastering Tshark Network Forensics Moving From Zero To Hero , Cloud Forensics Demystified , Wireshark For Network Forensics An Essential Guide For It And Cloud Professionals , Virtualization And Forensics A Digital Forensic Investigators Guide To Virtual Environments , The Practice Of Network Security Monitor , Bayesian Networks For Probabilistic Inference And Decision Analysis , Digital Forensics And Incident Response Second Edition , Practical Cyber Intelligence A Hands On Guide To Digital Forensics Hb 2024 , Windows Forensics Analyst Field Guide , Digital Forensics Basics A Practical Guide Using Windows Os , Cyber Forensics Examining Emerging And Hybrid Technologies , Learning Python For Forensics Second Edition , Digital Forensics With Open Source Tools , Practical Forensic Imaging Securing Digital Evidence With Linux Tools , Practical Memory Forensics Jumpstart Effective Forensic Analysis Of Volatile Memory , Computer Networking 8e , Linux Kernel Networking Implementation And Theory , A Bug Hunters Diary A Guided Tour Through The Wilds Of Software Security , Real World Bug Hunting A Field Guide To Web Hacking , Black Hat Bash Creative Scripting For Hackers And Pentesters , Blue Fox Arm Assembly Internals Binary Analys Iotdevices , Mastering Windows Security And Hardening , Ios Forensics For Investigators , The Hardware Hacking Handbook , Effective Threat Investigation For Soc Analysts , Hands On Hacking Become An Expert At Next Gen Penetration Testing And Purple Teaming , Penetration Testing , Mastering Active Directory Third Edition , Attacking And Exploiting Modern Web Application , Burp Suite Cookbook Second Edition , Networking For Dummies , Bug Bounty Bootcamp , Comptia Security Get Certified Get Ahead Sy0 701 Study Guide , Comptia Security Sy0 701 Certification Guide , The Definitive Guide To The Xen Hypervisor Prentice Hall Open Source Software Development , Isc2 Cissp Certified Information Systems Security Professional Official Study Guide , Isc2 Cissp Certified Information Systems Security Professional Official Study Guide And Practice , Cisco Cyberops Associate Cbrops 200 201 Official Cert Guide 1e , Designing Data Intensive Applications , System Design Interview 2 Books In 1 , Extreme C Taking You To The Limit In Concurrency Oop , Writing A C Compiler , Fundamentals Of Software Architecture An Engineering Approach , Building Microservices Designing Fine Grained Systems Second Edition Grayscale Indian Edition , Acing The System Design Interview , Design Bid Details/ 2 / 123 Patterns Elements Of Reusable Object Oriented Software , Head First Design Patterns Building Extensible And Maintainable Object Oriented Software , Design Patterns For Cloud Native Applications Patterns In Practice U , Mastering Kvm Virtualization , Concise Guide To Formal Methods Theory Fundamentals And Industry Applications , Building Secure Firmware Armoring The Foundation Of The Platform , Cryptography An in Patna - Bihar

Tender Details
Reference # :
40058104
Description :
Tenders for Procurement Of Books - Intelligence And Data Driven Threat Hunting , Learn Computer Forensics Second Edition , Practical Digital Forensics , Practical Cyber Forensics An Incident Based Approach To Forensic Investigations , Ethical Password Cracking Decode Passwords , Automating Security Detection Engineering , Practical Linux Forensics A Guide For Digital Investigators , Implementing Reverse Engineering , Practical Mobile Forensics Fourth Edition , Digital Forensics And Incident Response Third Edition , Digital Forensics And Incident Response A Practical Guide To Using Kali Linux For Cyber Investigations , Handson Network Forensics , Mastering Network Forensics Practical Approach To Investigating And Defending Against Network Attacks , Fundamentals Of Network Forensics A Research Perspective Computer Communications And Networks , Multimedia Forensics Advances In Computer Vision And Pattern Recognition , Mastering Windows Network Forensics And Investigation , Digital Forensics With Kali Linux Third Edition Enhance , Learning By Practicing Mastering Tshark Network Forensics Moving From Zero To Hero , Cloud Forensics Demystified , Wireshark For Network Forensics An Essential Guide For It And Cloud Professionals , Virtualization And Forensics A Digital Forensic Investigators Guide To Virtual Environments , The Practice Of Network Security Monitor , Bayesian Networks For Probabilistic Inference And Decision Analysis , Digital Forensics And Incident Response Second Edition , Practical Cyber Intelligence A Hands On Guide To Digital Forensics Hb 2024 , Windows Forensics Analyst Field Guide , Digital Forensics Basics A Practical Guide Using Windows Os , Cyber Forensics Examining Emerging And Hybrid Technologies , Learning Python For Forensics Second Edition , Digital Forensics With Open Source Tools , Practical Forensic Imaging Securing Digital Evidence With Linux Tools , Practical Memory Forensics Jumpstart Effective Forensic Analysis Of Volatile Memory , Computer Networking 8e , Linux Kernel Networking Implementation And Theory , A Bug Hunters Diary A Guided Tour Through The Wilds Of Software Security , Real World Bug Hunting A Field Guide To Web Hacking , Black Hat Bash Creative Scripting For Hackers And Pentesters , Blue Fox Arm Assembly Internals Binary Analys Iotdevices , Mastering Windows Security And Hardening , Ios Forensics For Investigators , The Hardware Hacking Handbook , Effective Threat Investigation For Soc Analysts , Hands On Hacking Become An Expert At Next Gen Penetration Testing And Purple Teaming , Penetration Testing , Mastering Active Directory Third Edition , Attacking And Exploiting Modern Web Application , Burp Suite Cookbook Second Edition , Networking For Dummies , Bug Bounty Bootcamp , Comptia Security Get Certified Get Ahead Sy0 701 Study Guide , Comptia Security Sy0 701 Certification Guide , The Definitive Guide To The Xen Hypervisor Prentice Hall Open Source Software Development , Isc2 Cissp Certified Information Systems Security Professional Official Study Guide , Isc2 Cissp Certified Information Systems Security Professional Official Study Guide And Practice , Cisco Cyberops Associate Cbrops 200 201 Official Cert Guide 1e , Designing Data Intensive Applications , System Design Interview 2 Books In 1 , Extreme C Taking You To The Limit In Concurrency Oop , Writing A C Compiler , Fundamentals Of Software Architecture An Engineering Approach , Building Microservices Designing Fine Grained Systems Second Edition Grayscale Indian Edition , Acing The System Design Interview , Design Bid Details/ 2 / 123 Patterns Elements Of Reusable Object Oriented Software , Head First Design Patterns Building Extensible And Maintainable Object Oriented Software , Design Patterns For Cloud Native Applications Patterns In Practice U , Mastering Kvm Virtualization , Concise Guide To Formal Methods Theory Fundamentals And Industry Applications , Building Secure Firmware Armoring The Foundation Of The Platform , Cryptography An
Ownership :
Sector :
Tender Values
Value :
900,000
EMD :
18,000
Doc. Cost :
NA
Important Dates
Due date :
08 May, 2025
Open date :
08 May, 2025
Publish date :
17 Apr, 2025
Location
Location :
Patna - Bihar ( IN )
Connect us via What's Up