| Item type | Current library | Home library | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Textual
|
Central Science Library | Central Science Library | D65,8(B):71:(894) Q6 TD (Browse shelf(Opens below)) | Available | SL1600034 |
Browsing Central Science Library shelves Close shelf browser (Hides shelf browser)
| D65,8(B):71:(894) Q5 TD Secure data provenance and inference control with semantic web | D65,8(B):71:(894) Q5 TD Securiing VOIP : keeping your VOIP network safe | D65,8(B):71:(894) Q6 Security and privacy in internet of things (IoTs): Models, algorithms, and implementations | D65,8(B):71:(894) Q6 TD Cybercrime: key issues and debates | D65,8(B):71:(894) Q8 Computer and network security essentials | D65,8(B):71:(894) Q9 Software-defined networking and security: From theory to practice | D65,8(B):71:(894)g N7 RR Handbook of applied cryptography |
References 283-294p.; Index 295-308p.
There are no comments on this title.
Log in to your account to post a comment.

Text