HACKER'S HANDBOOK:STRATEGY BEHIND BREAKING INTO AND DEFENDING NETWORKS
By: YOUNG,S.
Material type:![materialTypeLabel](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
CENTRAL LIBRARY | 621.38195 Y694 (Browse shelf) | Not for loan | 075057 |
Browsing CENTRAL LIBRARY Shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
621.38195 J25 HANDBOOK OF COMPUTER VISION AND APPLICATIONS:VOL 2:SIGNAL PROCESSING AND PATTERN | 621.38195 J25 HANDBOOK OF COMPUTER VISION AND APPLICATIONS:VOL 2:SIGNAL PROCESSING AND PATTERN | 621.38195 J25 HANDBOOK OF COMPUTER VISION AND APPLICATIONS: VOL- 3: SYSTEMS AND APPLICATIONS | 621.38195 Y694 HACKER'S HANDBOOK:STRATEGY BEHIND BREAKING INTO AND DEFENDING NETWORKS | 621.3819502 O42 COMPUTER ENGINEERING HANDBOOK | 621.3819502 T891 COMPUTER SCIENCE HANDBOOK | 621.3819503 H496 ENCYCLOPEDIA OF COMPUTER SCIENCE AND TECHNOLOGY |
There are no comments for this item.