Information Security: Principles and Practice Deven N. Shah
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Don Bosco Institute of Technology Library | 005.82 SHA/INF (Browse shelf(Opens below)) | Lost | 11817 | ||
Don Bosco Institute of Technology Library | 005.8 SHA/INF (Browse shelf(Opens below)) | Available | D-115 | ||
Don Bosco Institute of Technology Library | 005.82 SHA/INF (Browse shelf(Opens below)) | Lost | 11818 |
Browsing Don Bosco Institute of Technology Library shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.82 SCH/APP Applied Crypyography: Protocols, Algorithms, and Source Code in C | 005.82 SCH/APP Applied Cryptography: Protocols, Algorithms, and Source Code in C | 005.82 SHA/INF Information Security: Principles and Practice | 005.82 SHA/INF Information Security: Principles and Practice | 005.82 STA/CRY Cryptography And Network Security : Principles and Practice | 005.82 STA/CRY Cryptography And Network Security : Principles and Practice | 005.82 STI/CRY Cryptography Theory and Practice |
Following book also having appendix.
There are no comments on this title.