Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-12993 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-12994 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-12995 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-12996 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-12997 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-12998 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-12999 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13000 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13001 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13002 | ||
![]() |
Symbiosis Institute of Computer Studies and Research Reference | Reference | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-11546 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-11548 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-11549 | ||
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-11550 |
CRYPTOGRAPHY
THIS BOOK CLEARLY EXPLAINS THE CONCEPTS AND PRACTICAL ISSUES BEHIND CRYPTOGRAPHY AND NETWORK SECURITY
There are no comments on this title.