Cyber laws Singh Yatindra
Material type:
TextLanguage: English Publication details: 2003DDC classification: - X:8:(D6,8(B)),22):(Z), P3
| Item type | Current library | Home library | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Textual
|
South Campus Library | South Campus Library | X:8:(D6,8(B)),22):(Z) P3 (Browse shelf(Opens below)) | Available | SC1309700 |
Browsing South Campus Library shelves Close shelf browser (Hides shelf browser)
| X:8:(D6,8(B),22:8) P4 Database management systems | X:8:(D6,8(B),22:8) P5 Mastering data mining | X:8:(D6,8(B),22:8) P6 Data mining Concepts and techniques | X:8:(D6,8(B)),22):(Z) P3 Cyber laws | X:8:(D6,8(B),2771) N9 Cyberspace and repositioning of corporations | X:8:(D6,8(B),2771) P0 10-second internet manager Survive thrive and drive your company in the information age | X:8:(D6,8(B),2771) P0 Law of information technology (cyber law) With information technology ( Certifying authorities) rules,2000 |
There are no comments on this title.
Log in to your account to post a comment.
