Computer security / Suraj Bhan Jha
Material type:
- 9789352691050
- 005.8
- QA76.9.A25 J59

Home library | Call number | Copy number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
ABAKALIKI BRANCH | QA76.9.A25 J61 (Browse shelf(Opens below)) | 1 | Available | 2022-0288 | |||
ABUJA LIBRARY BRANCH | QA76.9.A25 J61 (Browse shelf(Opens below)) | 1 | Available | 2022-0287 | |||
AWKA BRANCH | QA76.9.A25 J61 (Browse shelf(Opens below)) | 1 | Available | 2022-0289 | |||
EKITI BRANCH LIBRARY | QA76.9.A25 J61 (Browse shelf(Opens below)) | 1 | Available | 2022-0290 | |||
LOKOJA BRANCH | QA76.9.A25 J61 (Browse shelf(Opens below)) | 1 | Available | 2022-0292 | |||
PORT HARCOURT BRANCH | QA76.9.A25 J61 (Browse shelf(Opens below)) | 1 | Available | 2022-0293 | |||
UYO BRANCH | QA76.9.A25 J61 (Browse shelf(Opens below)) | 1 | Available | 2022-0291 | |||
YENAGOA BRANCH | QA76.9.A25 J61 (Browse shelf(Opens below)) | 1 | Available | 2022-0294 |
Total holds: 0
Browsing EKITI BRANCH LIBRARY shelves Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.8 . I64 M345 More iphone 3 development : tackling ipnone SDK3 / | QA76.9. A25 CYBERSECURITY for information professionals: concepts and applications/ | QA76.9.A25 I14 Cybersecurity initiatives for securing a country / | QA76.9.A25 J61 Computer security / | QA76.9.C65 G275 Computer simulation using particles / | QA76.9.D3 H698 Modern database management/ | QA76.9.D343 D232 Data mining: practical machine learning tools and techniques/ |
Bibliography: p. 249-260
(hbk)
There are no comments on this title.
Log in to your account to post a comment.