Tender For providing of cyber security audit - infrastructure audit, operations, management process and control audit, security and compliance audit, information system audit
Tender For procurement of books - intelligence and data driven threat hunting , learn computer forensics second edition , practical digital forensics , practical cyber forensics an incident based approach to forensic investigations , ethical password cracking decode passwords , automating security detection engineering , practical linux forensics a guide for digital investigators , implementing reverse engineering , practical mobile forensics fourth edition , digital forensics and incident response third edition , digital forensics and incident response a practical guide to using kali linux for cyber investigations , handson network forensics , mastering network forensics practical approach to investigating and defending against network attacks , fundamentals of network forensics a research perspective computer communications and networks , multimedia forensics advances in computer vision and pattern recognition , mastering windows network forensics and investigation , digital forensics with kali linux third edition enhance , learning by practicing mastering tshark network forensics moving from zero to hero , cloud forensics demystified , wireshark for network forensics an essential guide for it and cloud professionals , virtualization and forensics a digital forensic investigators guide to virtual environments , the practice of network security monitor , bayesian networks for probabilistic inference and decision analysis , digital forensics and incident response second edition , practical cyber intelligence a hands on guide to digital forensics hb 2024 , windows forensics analyst field guide , digital forensics basics a practical guide using windows os , cyber forensics examining emerging and hybrid technologies , learning python for forensics second edition , digital forensics with open source tools , practical forensic imaging securing digital evidence with linux tools , practical memory forensics jumpstart effective forensic analysis of volatile memory , computer networking 8e , linux kernel networking implementation and theory , a bug hunters diary a guided tour through the wilds of software security , real world bug hunting a field guide to web hacking , black hat bash creative scripting for hackers and pentesters , blue fox arm assembly internals binary analys iotdevices , mastering windows security and hardening , ios forensics for investigators , the hardware hacking handbook , effective threat investigation for soc analysts , hands on hacking become an expert at next gen penetration testing and purple teaming , penetration testing , mastering active directory third edition , attacking and exploiting modern web application , burp suite cookbook second edition , networking for dummies , bug bounty bootcamp , comptia security get certified get ahead sy0 701 study guide , comptia security sy0 701 certification guide , the definitive guide to the xen hypervisor prentice hall open source software development , isc2 cissp certified information systems security professional official study guide , isc2 cissp certified information systems security professional official study guide and practice , cisco cyberops associate cbrops 200 201 official cert guide 1e , designing data intensive applications , system design interview 2 books in 1 , extreme c taking you to the limit in concurrency oop , writing a c compiler , fundamentals of software architecture an engineering approach , building microservices designing fine grained systems second edition grayscale indian edition , acing the system design interview , design bid details/ 2 / 123 patterns elements of reusable object oriented software , head first design patterns building extensible and maintainable object oriented software , design patterns for cloud native applications patterns in practice u , mastering kvm virtualization , concise guide to formal methods theory fundamentals and industry applications , building secure firmware armoring the foundation of the platform , cryptography an
Tender For corrigendum : rfp for technical support service including helpdesk and operation and maintenance for financial management information system (fmis) under finance department government of assam
Tender For competitive e billing for gis survey mapping and all residential non residential gov house house tax, water tax and departmental web site and mobile application, management information system mis software.
Tender For corrigendum : providing of custom bid for services - one time development cost of central solution - bidder to quote total price including gst -for hospital information management system,custom bid for services - data integration and operationalization of iocl location(s) (9 locations) - bidder to quote total price for 9 locations including gst-for hospital information management system,custom bid for services - onsite user training for iocl location (s) (9 locations) - bidder to quote total price for 9 locations including gst-for hospital information management system,custom bid for services - annual maintenance contract (amc) for 5 years (post defect liability period of 12 months) - bidder to quote total annual maintenance contract charges for 5 years including gst-for hospital information management system,custom bid for services - cloud hosting charges for 5 years (post defect liability period of 12 months) - bidder to quote total cloud hosting charges for 5 years including gst-for hospital information management system