CRYPTOGRAPHY AND NETWORK SECURITY
Material type: TextLanguage: English Publication details: TMH NEW DELHI 2008Edition: 2ndDescription: xxii,539ISBN:- 1.3978E+14
- 5.82 KAH
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | Symbiosis Institute of Computer Studies and Research Book Cart | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17357 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17358 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17359 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17360 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-17361 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16615 | |
Books | Symbiosis Institute of Computer Studies and Research Book Cart | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16616 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16617 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16618 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.8 KAH (Browse shelf(Opens below)) | Available | SICSR-B-16619 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13836 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13837 | |
Books | Symbiosis Institute of Computer Studies and Research Computer security | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13839 | |
Books | Symbiosis Institute of Computer Studies and Research | 5.82 KAH (Browse shelf(Opens below)) | Available | SICSR-B-13840 |
COMPUTER SECURITY
THIS BOOK CLEARLY EXPLAINS THE CONCEPTS IN CRYPTOGRAPHY AND THE PRINCIPLES EMPLOYED BEHIND NETWORK SECURITY.THE TEXT STEERS CLEAR OF COMPLEX MATHEMATICAL TREATMENT AND PRESENTS THE CONCEPTS INVOLVED THROUGH EASY TO FOLLOW EXAMPLES AND SCHEMATIC DIAGRAMS
There are no comments on this title.