TextPublication details: New Delhi Wiley India 2011Description: XX, 445ISBN: | Item type | Current library | Collection | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
| Books | NMIT | MCA | 005.82 SHA (Browse shelf(Opens below)) | Available | 24974 | |
| Books | NMIT | MCA | 005.82 SHA (Browse shelf(Opens below)) | Available | 24975 | |
| Books | NMIT | MCA | 005.82 SHA (Browse shelf(Opens below)) | Available | 24976 | |
| Books | NMIT | MCA | 005.82 SHA (Browse shelf(Opens below)) | Available | 24977 | |
| Books | NMIT | MCA | 005.82 SHA (Browse shelf(Opens below)) | Available | 24978 | |
| Books | NMIT | MCA | 005.82 SHA (Browse shelf(Opens below)) | Available | 24979 | |
| Reference | NMIT | M.Tech-CSE | 005.82 SHA (Browse shelf(Opens below)) | Available | 23095 | |
| Books | NMIT | M.Tech-CSE | 005.82 SHA (Browse shelf(Opens below)) | Available | 23096 | |
| Books | NMIT | M.Tech-CSE | 005.82 SHA (Browse shelf(Opens below)) | Available | 23097 | |
| Books | NMIT | M.Tech-CSE | 005.82 SHA (Browse shelf(Opens below)) | Available | 23098 | |
| Books | NMIT | M.Tech-CSE | 005.82 SHA (Browse shelf(Opens below)) | Available | 23099 | |
| Books | NMIT | M.Tech-CSE | 005.82 SHA (Browse shelf(Opens below)) | Available | 23100 | |
| Books | NMIT | M.Tech-CSE | 005.82 SHA (Browse shelf(Opens below)) | Available | 23101 | |
| Books | NMIT | M.Tech-CSE | 005.82 SHA (Browse shelf(Opens below)) | Available | 23102 |
| 005.8 PFL Security in Computing | 005.8 PFL Security in Computing | 005.8 SHE Anti-Hacker Tool Kit | 005.82 SHA Mark Stamp's Information Security: principles and practices | 005.82 SHA Mark Stamp's Information Security: principles and practices | 005.82 SHA Mark Stamp's Information Security: principles and practices | 005.82 SHA Mark Stamp's Information Security: principles and practices |
There are no comments on this title.