Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger and Deven Shah
Material type:
- 978-81-317-2725-6
- 23rd. 005.8
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
![]() |
North Eastern Hill University | INFORMATION TECHNOLOGY | 005.8 (Browse shelf(Opens below)) | ,3;1 | Available | 296743 | |||
![]() |
North Eastern Hill University | INFORMATION TECHNOLOGY | 005.8 (Browse shelf(Opens below)) | ,3;2 | Available | 296744 | |||
![]() |
North Eastern Hill University | INFORMATION TECHNOLOGY | 005.8 (Browse shelf(Opens below)) | ,3;3 | Available | 296745 | |||
![]() |
North Eastern Hill University | INFORMATION TECHNOLOGY | 005.8 (Browse shelf(Opens below)) | ,3 | Available | 296344 |
Total holds: 0
Browsing North Eastern Hill University shelves, Collection: INFORMATION TECHNOLOGY Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 PAU RC4 stream cipher and its variants | 005.8 Security in computing | 005.8 Security in computing | 005.8 Security in computing | 005.8 Security in computing | 005.82 FOR Cryptography and network security | 005.82 FOR Cryptography and network security |
There are no comments on this title.
Log in to your account to post a comment.