Security Patterns
Material type:
TextPublication details: John Wiley And Sons EnglandDescription: xxxiii 565ISBN: - 470858842
- 93301 SCH
| Item type | Current library | Call number | Status | Date due | Barcode |
|---|---|---|---|---|---|
Books
|
Symbiosis Centre for Information Technology REFERENCE CUPBOARD | 005.8 SCH (Browse shelf(Opens below)) | Available | SCIT-B-8404 |
Browsing Symbiosis Centre for Information Technology shelves, Shelving location: REFERENCE CUPBOARD Close shelf browser (Hides shelf browser)
| No cover image available |
|
No cover image available | No cover image available |
|
|
|
||
| 005.8 RIT/HAN Cybersecurity Operations Handbook | 005.8 RIT/HAN Cybersecurity Operations Handbook | 005.8 RUH/MAG Enterprise Application Integration | 005.8 SCH Security Patterns | 005.8 SHE/CLA Enterprise Security Architecture:A Business Driven Approach | 005.8 SIM/BAC Hands On Ethical Hacking And Network Defense 2 Nd Ed | 005.8 SKO/LIS Counter Hack Reloaded |
English
Books
There are no comments on this title.