| Item type | Current library | Home library | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Textual
|
South Campus Library | South Campus Library | D6,8(B),94 Q5 (Browse shelf(Opens below)) | Available | SC1438554 |
Browsing South Campus Library shelves Close shelf browser (Hides shelf browser)
| D6,8(B),94 Q2 Building secure software How to avoid security problems the right way (Addison-Wesley professional computing series) | D6,8(B),94 Q2 Analyzing computer security A threat vulnerability/countermeasure approach | D6,8(B),94 Q4 Digital wars Apple, Google, microsoft and the battle for the internet | D6,8(B),94 Q5 Artificial intelligence and network security | D6,8(B),942 N5 Cryptography theory and pratice | D6,8(B),942 N6 Applied cryptography | D6,8(B),942 N6 Applied cryptography |
There are no comments on this title.
Log in to your account to post a comment.

Text