| Item type | Current library | Home library | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Textual
|
Central Science Library | Central Science Library | D65,8(B):(894) Q5 (Browse shelf(Opens below)) | Available | SL1562868 |
Browsing Central Science Library shelves Close shelf browser (Hides shelf browser)
| D65,8(B):(894) Q5 Cybercrime and digital forensics: An introduction | D65,8(B):(894) Q5 Visual cryptography for image processing and security: theory, methods, and applications | D65,8(B):(894) Q5 Hardware security: design, threats, and safeguards | D65,8(B):(894) Q5 Essentials of cloud computing | D65,8(B):(894) Q5 Securing systems: applied security architecture and threat models | D65,8(B):(894) Q5 Practical cryptography: algorithms and implementations using c ++ | D65,8(B):(894) Q5 Fraud analysis using descriptive predictive and social network techniques: a guide to data science for fraub detection |
Review point 366-367p.; References 368p.; Index 371-385p.
There are no comments on this title.
Log in to your account to post a comment.

Text