Cryptography and network security by Atul Kahatea
Material type:
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
FMS Library
|
005.82 KAH (Browse shelf(Opens below)) | In transit from FMS Library to FEST Library since 05/12/2024 | E005267 | |
![]() |
FEST Library
|
005.82 KAH (Browse shelf(Opens below)) | Available | E005268 | |
![]() |
FEST Library
|
005.82 KAH (Browse shelf(Opens below)) | Available | E005906 | |
![]() |
FEST Library
|
005.82 KAH (Browse shelf(Opens below)) | Available | E004700 |
Browsing FEST Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.82 JAI Cryptography and network security | 005.82 JAI Cryptography and network security | 005.82 KAH Cryptography and network security | 005.82 KAH Cryptography and network security | 005.82 KAH Cryptography and network security | 005.82 KAH Cryptography and network security | 005.82 STA Cryptography and network security principles and practice |
There are no comments on this title.