Security in Computing
Material type: TextPublication details: New Jersy Prentice Hall 1989 Subject(s): COMPUTERS-ACCESS CONTROL | PRIVACY RIGHT OF | DATA PROTECTION | COMPUTER SCIENCE | COMPUTER SCIENCEDDC classification: 005.8Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
General Books | Malaviya National Institute of Technology | 005.8 PEL (Browse shelf(Opens below)) | Available | 64156 |
Browsing Malaviya National Institute of Technology shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | |||||||
005.8 OBA Security of E-Systems and Computer Networks | 005.8 ORI Hacker Techniques, Tools, and Incident Handling | 005.8 ORI,C-1 Hacker Techniques, Tools, and Incident Handling | 005.8 PEL Security in Computing | 005.8 PFL Security in Computing | 005.8 PFL Security in Computing | 005.8 PFL Security in Computing |
There are no comments on this title.