Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52890 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52891 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52892 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52893 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52894 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52895 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52896 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52897 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52898 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 52899 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Not for loan | 46934 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 46935 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 46936 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 46937 | ||
![]() |
NMIT | CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 46938 | ||
![]() |
NMIT | M.Tech-CSE | 005.8 SHE (Browse shelf(Opens below)) | Available | 43359 |
005.8 RED Practical Cyber Forensics: an incident-based approach to Forensic Investigations | 005.8 RED Practical Cyber Forensics: an incident-based approach to Forensic Investigations | 005.8 SHE Anti-Hacker Tool Kit | 005.8 SHE Anti-Hacker Tool Kit | 005.8 SHE Anti-Hacker Tool Kit | 005.8 SHE Anti-Hacker Tool Kit | 005.8 SHE Anti-Hacker Tool Kit |
There are no comments on this title.