Internet Forensics
Material type: TextPublication details: MUMBAI SHROFF PUBLISHERS & DISTRIBUTORS 2006 Subject(s): COMPUTER SECURITY, COMPUTER SCIENCE | COMPUTER SCIENCEDDC classification: 005.8Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
General Books | Malaviya National Institute of Technology | 005.8 JON (Browse shelf(Opens below)) | Available | 71062 |
Browsing Malaviya National Institute of Technology shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | |||||
005.8 JAN Security Strategies in Linux Platforms and Applications | 005.8 JAN, C-1 Security Strategies in Linux Platforms and Applications | 005.8 JOH Information Hiding | 005.8 JON Internet Forensics | 005.8 KEM WIRELESS INTERNET SECURITY | 005.8 KEN Cryptography in the Database | 005.8 KIM Fundamentals of Information Systems Security |
There are no comments on this title.