Security in Computing
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Don Bosco Institute of Technology Library | 005.8 PFL/SEC (Browse shelf(Opens below)) | Available | 19648 | ||
Don Bosco Institute of Technology Library | 005.8 PFL/SEC (Browse shelf(Opens below)) | Available | 18872 | ||
Don Bosco Institute of Technology Library | 005.8 PFL/SEC (Browse shelf(Opens below)) | Available | 18873 | ||
Don Bosco Institute of Technology Library | 005.8 PFL/SEC (Browse shelf(Opens below)) | Checked out to Udaychandra Nayak (504) | 16/12/2022 | 18874 | |
Don Bosco Institute of Technology Library | 005.8 PFL/SEC (Browse shelf(Opens below)) | Available | 18875 | ||
Don Bosco Institute of Technology Library | 005.8 PFL/SEC (Browse shelf(Opens below)) | Available | 18876 |
Browsing Don Bosco Institute of Technology Library shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 PFL/SEC Security in Computing | 005.8 PFL/SEC Security in Computing | 005.8 PFL/SEC Security in Computing | 005.8 PFL/SEC Security in Computing | 005.8 PFL/SEC Security in Computing | 005.8 ROG/SEC Security Assessment : Case Studies for Implementing the NSA IAM | 005.8 SAR/NET Network and Information Security issues, Challenges adn Research Trends |
There are no comments on this title.