Web Analytics Made Easy - StatCounter

Tender for Supply Of Meta Sploit The Penetration Testers Guide Second Edition , Applied Cryptography Protocols, Algorithms And Source Code In C, Second Edition , Tribe Of Hackers Blue Team Tribal Knowledge From The Best In Defensive Cybersecurity , Countdown To Zero Day , Future Crimes , The Art Of Deception , The Art Of Invisibility , Social Engineering The Art Of Human Hacking , Practical Malware Analysis , Industrial Control System And Operational Technology Security , Gray Hat Hacking , Hacking Exposed Wireless , Wireshark Network Analysis , Malware Analysts Cookbook , Hands On Large Language Models Language Understanding And Generation , Cyber Risk Management Lessons Challenges And Solutions , Advanced Malware Analysis And Intelligence Investigating Malicious Code With Static And Dynamic Analysis And Threat Intelligence , Hacking Tricks, Methods And Offensive Strategies Digital Reconnaissance, Network Enumeration And System Exploitation Strategies , Zero Trust Networks Building Secure Systems In Untrusted Networks, Second Edition , Ukraine, Gaza, Taiwan A World At War , The Russia Ukraine War , India Battlefields From Kurukshetra To Balakot Incl Op Sindoor , Hands On Red Team Tactics A Practical Guide To Mastering Red Team Operations , Hands On Generative Adversarial Networks With Pytorch , Large Language Models In Cybersecurity Threats, Exposure And Mitigation 2024 , Hands On Machine Learning For Cybersecurity 2018 , Adversarial Ai Attacks, Mitigations, And Defense Strategies 2024 , Building Agentic Ai Systems 2024 , Machine Learning And Security , Malware Development For Ethical Hackers , The Shellcoders Handbook , Ready, Relevant And Resurgent A Blue Print For Transformation Of Indias Military , Adversarial Machine Learning , Gans In Action Deep Learning With Generative Adversarial Networks 2019 , Hands On Go Programming , Nexus Yuval Noah Harari , E-books , Online Source Of Info Cyber Security Concepts , Online Source Of Info Cyber Security Research , Online Source Of Info Adv Cyber Tech Methodologies , Open Source For You , Pc Quest , Data Quest , Voice And Data , Journal On Digital Forensics And Cyber Security , Digit , National Journal Of Cyber Security Law , Electronics For You , Magzter E-subscription , Journal Of Artificial Intelligence Research And Advance , Journal Of Cyber Security , International Journal Of Information Security Engineering , International Journal Of Wireless Security And Networks in Indore - Madhya Pradesh

Tender Details
Reference # :
43549151
Description :
Tenders for Supply Of Meta Sploit The Penetration Testers Guide Second Edition , Applied Cryptography Protocols, Algorithms And Source Code In C, Second Edition , Tribe Of Hackers Blue Team Tribal Knowledge From The Best In Defensive Cybersecurity , Countdown To Zero Day , Future Crimes , The Art Of Deception , The Art Of Invisibility , Social Engineering The Art Of Human Hacking , Practical Malware Analysis , Industrial Control System And Operational Technology Security , Gray Hat Hacking , Hacking Exposed Wireless , Wireshark Network Analysis , Malware Analysts Cookbook , Hands On Large Language Models Language Understanding And Generation , Cyber Risk Management Lessons Challenges And Solutions , Advanced Malware Analysis And Intelligence Investigating Malicious Code With Static And Dynamic Analysis And Threat Intelligence , Hacking Tricks, Methods And Offensive Strategies Digital Reconnaissance, Network Enumeration And System Exploitation Strategies , Zero Trust Networks Building Secure Systems In Untrusted Networks, Second Edition , Ukraine, Gaza, Taiwan A World At War , The Russia Ukraine War , India Battlefields From Kurukshetra To Balakot Incl Op Sindoor , Hands On Red Team Tactics A Practical Guide To Mastering Red Team Operations , Hands On Generative Adversarial Networks With Pytorch , Large Language Models In Cybersecurity Threats, Exposure And Mitigation 2024 , Hands On Machine Learning For Cybersecurity 2018 , Adversarial Ai Attacks, Mitigations, And Defense Strategies 2024 , Building Agentic Ai Systems 2024 , Machine Learning And Security , Malware Development For Ethical Hackers , The Shellcoders Handbook , Ready, Relevant And Resurgent A Blue Print For Transformation Of Indias Military , Adversarial Machine Learning , Gans In Action Deep Learning With Generative Adversarial Networks 2019 , Hands On Go Programming , Nexus Yuval Noah Harari , E-books , Online Source Of Info Cyber Security Concepts , Online Source Of Info Cyber Security Research , Online Source Of Info Adv Cyber Tech Methodologies , Open Source For You , Pc Quest , Data Quest , Voice And Data , Journal On Digital Forensics And Cyber Security , Digit , National Journal Of Cyber Security Law , Electronics For You , Magzter E-subscription , Journal Of Artificial Intelligence Research And Advance , Journal Of Cyber Security , International Journal Of Information Security Engineering , International Journal Of Wireless Security And Networks
Ownership :
Sector :
Tender Values
Value :
NA
EMD :
NA
Doc. Cost :
NA
Important Dates
Due date :
22 Jan, 2026
Open date :
22 Jan, 2026
Publish date :
12 Jan, 2026
Location
Location :
Indore - Madhya Pradesh ( IN )
Connect us via What's Up