Computer and intrusion forensics Mohay George; Anderson Alison; Collie Byron; VEL Olivier De; McKemmish Rodney
Material type:
- 1580533698 (hbd)
- D65,8(B):(894), P3
Item type | Current library | Home library | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
Central Science Library | Central Science Library | D65,8(B):(894) P3 (Browse shelf(Opens below)) | Available | SL1289057 |
Browsing Central Science Library shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
D65,8(B):(894) P2;3 TD Introduction to cryptography: principles and applications | D65,8(B):(894) P3 Introduction to cryptography with Java applets | D65,8(B):(894) P3 Security in computing | D65,8(B):(894) P3 Computer and intrusion forensics | D65,8(B):894 P3 Implementing biometric security | D65,8(B):(894) P3 Introduction to cryptography with java applets | D65,8(B):(894) P3 TD Role-based access control |
Includes bibliographical references; Index 383-395p. cm.
There are no comments on this title.
Log in to your account to post a comment.