Computer security and cryptography / Alan G.Konheim
By: Konheim, A. G.
Material type: BookPublisher: New Jersey: Wiley-interscience, 2007Description: xvii, 521p.: ill.ISBN: 9780471947837.Subject(s): -- Computer security | -- CryptographyItem type | Current location | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|---|
GENERAL COLLECTION FOR LOAN | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | Non-fiction | QA76.9.A25K63 2007 C.1 (Browse shelf) | C.1 | Available | 112B02862 | ||
GENERAL COLLECTION FOR LOAN | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | Non-fiction | QA76.9.A25K63 2007 C.2 (Browse shelf) | C.2 | Available | 112B02863 | ||
GENERAL COLLECTION FOR LOAN | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | Non-fiction | QA76.9.A25K63 2007 C.3 (Browse shelf) | C.3 | Available | 112B02864 |
Total holds: 0
Browsing MULTIMEDIA UNIVERSITY LIBRARY Shelves , Shelving location: General Stacks Close shelf browser
QA76.9.A25 D38 2015 C.1 Bayesian methods for hackers | QA76.9.A25 D38 2015 C.2 Bayesian methods for hackers | QA76.9.A25 D38 2015 C.3 Bayesian methods for hackers | QA76.9.A25K63 2007 C.1 Computer security and cryptography / | QA76.9.A25K63 2007 C.2 Computer security and cryptography / | QA76.9.A25K63 2007 C.3 Computer security and cryptography / | QA76.9.A25V33 2004 Computer forensics |
Includes bibliographical references and index book
There are no comments for this item.