CRYPTOGRAPHY AND NETWORK SECURITY
Material type:
- 1.3978E+14
- 5.82 KAH
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
Symbiosis Institute of Computer Studies and Research Book Cart | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17357 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17358 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17359 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17360 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17361 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16615 | |
![]() |
Symbiosis Institute of Computer Studies and Research Book Cart | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16616 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16617 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16618 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16619 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13836 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13837 | |
![]() |
Symbiosis Institute of Computer Studies and Research Computer security | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13839 | |
![]() |
Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13840 |
Browsing Symbiosis Institute of Computer Studies and Research shelves, Shelving location: Book Cart Close shelf browser (Hides shelf browser)
COMPUTER SECURITY
THIS BOOK CLEARLY EXPLAINS THE CONCEPTS IN CRYPTOGRAPHY AND THE PRINCIPLES EMPLOYED BEHIND NETWORK SECURITY.THE TEXT STEERS CLEAR OF COMPLEX MATHEMATICAL TREATMENT AND PRESENTS THE CONCEPTS INVOLVED THROUGH EASY TO FOLLOW EXAMPLES AND SCHEMATIC DIAGRAMS
There are no comments on this title.