Web Analytics Made Easy - StatCounter

Information Security Integrator Tenders

Get complete information related to latest Information Security Integrator Tenders . from India at Classic Tenders. Search the best available tenders from Indian government tenders, domestic Information Security Integrator Tenders , private tenders, online tenders, tender invitation notice, business tender notices, online tenders and bidding Information Security Integrator Tenders .

Filter
Loading....
Loading....
Loading....
Loading....
Loading....

Bid Submission Date Range
Tender Value

corporations/Associations/Others

CTN :40149399 Due date: 19 May, 202519 May, 2025 1.24 Crore
Tender For supply, installation, testing, commissioning and integration of tejas make dwdm equipment for the optical fiber cable based communication system of railtel - chassis -11 slot: tj1600-11 slot chassis and backplane , power filter unit, tj1600-11 slot chassis , fan tray unit card, tj1600-11 slot chassis , osmc (controller card for tj1600- 11) , osmc adapter card for 1600-11 , oam card, tj1600-11 slot chassis , basic installation kit for tj1600-11 slot chassis , enhanced installation kit for tj1600-11 slot chassis , line card filler for tj1600 chassis , chassis -2 slot: line card filler for tj1600 chassis , roadm:4-degree, flex grid roadm,lc/pc , dwdm mux/demux filter,40ch(even) , 2 slot passive chassis , dwdm mux/demux filter,8ch(even) , optical adapter card - to support two half slotwidth optical cards , dual port osc filter , optical adapter card - to support 1/3rd, 2/3rd slot width optical cards , fpu holder , opm: four port flex optical power monitoring , dual port, vg(l) amp, dwdm, cband , dual port, vg(m) amp, dwdm, c-band , dual port, vg(h) amp, dwdm, cband , osc sfp , patch cord lc-lc single mode dia 3mm 3 mtrs , optical, sfp+, 10gbase-lr/lw, stm64, 10km, duplex lc , 2xline ports + 2 x100g +10 xsfp+ pluggable client ports , server linux , nms software , license by hotstandby features

Central Government/Public Sector

CTN :40058104 Due date: 08 May, 202508 May, 2025 9.00 Lacs
Tender For procurement of books - intelligence and data driven threat hunting , learn computer forensics second edition , practical digital forensics , practical cyber forensics an incident based approach to forensic investigations , ethical password cracking decode passwords , automating security detection engineering , practical linux forensics a guide for digital investigators , implementing reverse engineering , practical mobile forensics fourth edition , digital forensics and incident response third edition , digital forensics and incident response a practical guide to using kali linux for cyber investigations , handson network forensics , mastering network forensics practical approach to investigating and defending against network attacks , fundamentals of network forensics a research perspective computer communications and networks , multimedia forensics advances in computer vision and pattern recognition , mastering windows network forensics and investigation , digital forensics with kali linux third edition enhance , learning by practicing mastering tshark network forensics moving from zero to hero , cloud forensics demystified , wireshark for network forensics an essential guide for it and cloud professionals , virtualization and forensics a digital forensic investigators guide to virtual environments , the practice of network security monitor , bayesian networks for probabilistic inference and decision analysis , digital forensics and incident response second edition , practical cyber intelligence a hands on guide to digital forensics hb 2024 , windows forensics analyst field guide , digital forensics basics a practical guide using windows os , cyber forensics examining emerging and hybrid technologies , learning python for forensics second edition , digital forensics with open source tools , practical forensic imaging securing digital evidence with linux tools , practical memory forensics jumpstart effective forensic analysis of volatile memory , computer networking 8e , linux kernel networking implementation and theory , a bug hunters diary a guided tour through the wilds of software security , real world bug hunting a field guide to web hacking , black hat bash creative scripting for hackers and pentesters , blue fox arm assembly internals binary analys iotdevices , mastering windows security and hardening , ios forensics for investigators , the hardware hacking handbook , effective threat investigation for soc analysts , hands on hacking become an expert at next gen penetration testing and purple teaming , penetration testing , mastering active directory third edition , attacking and exploiting modern web application , burp suite cookbook second edition , networking for dummies , bug bounty bootcamp , comptia security get certified get ahead sy0 701 study guide , comptia security sy0 701 certification guide , the definitive guide to the xen hypervisor prentice hall open source software development , isc2 cissp certified information systems security professional official study guide , isc2 cissp certified information systems security professional official study guide and practice , cisco cyberops associate cbrops 200 201 official cert guide 1e , designing data intensive applications , system design interview 2 books in 1 , extreme c taking you to the limit in concurrency oop , writing a c compiler , fundamentals of software architecture an engineering approach , building microservices designing fine grained systems second edition grayscale indian edition , acing the system design interview , design bid details/ 2 / 123 patterns elements of reusable object oriented software , head first design patterns building extensible and maintainable object oriented software , design patterns for cloud native applications patterns in practice u , mastering kvm virtualization , concise guide to formal methods theory fundamentals and industry applications , building secure firmware armoring the foundation of the platform , cryptography an
 Loading, Please wait...

Connect us via What's Up