Computer and communications security : strategies for the 1990s / James Arlin Cooper.
Material type:
- 0070129266
- QA76.9.A25 C51
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
CKT-UTAS Library General Stacks | QA76.9.A25 C51 (Browse shelf(Opens below)) | Available | NAV-517020355 |
Browsing CKT-UTAS Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||||
QA76.87 A11 Fuzzy Logic and Neural Networks | QA76.87 A42 Fuzzy Logic and Neural Networks | QA76.87 H11 Neural networks and learning machines / | QA76.9.A25 C51 Computer and communications security : | QA76.9.A25 C51 Computer security lab manual / | QA76.9 A25 C52 Computer security lab manual / | QA76.9.A25 C53 Computer security lab manual / |
Includes bibliographical references.
There are no comments on this title.
Log in to your account to post a comment.