Normal view MARC view ISBD view

Computer security and cryptography / Alan G.Konheim

By: Konheim, A. G.
Material type: materialTypeLabelBookPublisher: New Jersey: Wiley-interscience, 2007Description: xvii, 521p.: ill.ISBN: 9780471947837.Subject(s): -- Computer security | -- Cryptography
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Home library Collection Call number Copy number Status Date due Barcode Item holds
GENERAL COLLECTION FOR LOAN GENERAL COLLECTION FOR LOAN MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
Non-fiction QA76.9.A25K63 2007 C.1 (Browse shelf) C.1 Available 112B02862
GENERAL COLLECTION FOR LOAN GENERAL COLLECTION FOR LOAN MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
Non-fiction QA76.9.A25K63 2007 C.2 (Browse shelf) C.2 Available 112B02863
GENERAL COLLECTION FOR LOAN GENERAL COLLECTION FOR LOAN MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
Non-fiction QA76.9.A25K63 2007 C.3 (Browse shelf) C.3 Available 112B02864
Total holds: 0
Browsing MULTIMEDIA UNIVERSITY LIBRARY Shelves , Shelving location: General Stacks Close shelf browser
QA76.9.A25 D38 2015 C.1 Bayesian methods for hackers QA76.9.A25 D38 2015 C.2 Bayesian methods for hackers QA76.9.A25 D38 2015 C.3 Bayesian methods for hackers QA76.9.A25K63 2007 C.1 Computer security and cryptography / QA76.9.A25K63 2007 C.2 Computer security and cryptography / QA76.9.A25K63 2007 C.3 Computer security and cryptography / QA76.9.A25V33 2004 Computer forensics

Includes bibliographical references and index book

There are no comments for this item.

Log in to your account to post a comment.

Mobile:
Email: info@mmu.ac.ke| |Website

Powered by CoreTEC.co.ke.