Computer networks / (Record no. 3626)

MARC details
000 -LEADER
fixed length control field 12436cam a2200265 a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230110075035.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780133942484
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency UKM
Language of cataloging Eng
Description conventions rda
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title Eng
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.5
Item number TAN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tanenbaum, Andrew S.,
Dates associated with a name 1944-
Relator term Author:
245 10 - TITLE STATEMENT
Title Computer networks /
Statement of responsibility, etc. Andrew S. Tanenbaum
Medium Textbook :
250 ## - EDITION STATEMENT
Edition statement 3rd ed
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, N.J. :
Name of publisher, distributor, etc. Prentice Hall PTR,
Date of publication, distribution, etc. 1996
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 813 pages. :
Other physical details illustrations., maps ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 767-794) and index
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note PREFACE XV <br/>1 INTRODUCTION<br/>1 (76)<br/>1.1 USES OF COMPUTER NETWORKS<br/>3 (4)<br/>1.1.1 Networks for Companies<br/>3 (1)<br/>1.1.2 Networks for People<br/>4 (2)<br/>1.1.3 Social Issues<br/>6 (1)<br/>1.2 NETWORK HARDWARE<br/>7 (9)<br/>1.2.1 Local Area Networks<br/>9 (1)<br/>1.2.2 Metropolitan Area Networks<br/>10 (1)<br/>1.2.3 Wide Area Networks<br/>11 (2)<br/>1.2.4 Wireless Networks<br/>13 (3)<br/>1.2.5 Internetworks<br/>16 (1)<br/>1.3 NETWORK SOFTWARE<br/>16 (12)<br/>1.3.1 Protocol Hierarchies<br/>17 (4)<br/>1.3.2 Design Issues for the Layers<br/>21 (1)<br/>1.3.3 Interfaces and Services<br/>22 (1)<br/>1.3.4 Connection-Oriented and Connectionless Services<br/>23 (2)<br/>1.3.5 Service Primitives<br/>25 (2)<br/>1.3.6 The Relationship of Services to Protocols<br/>27 (1)<br/>1.4 REFERENCE MODELS<br/>28 (16)<br/>1.4.1 The OSI Reference Model<br/>28 (7)<br/>1.4.2 The TCP/IP Reference Model<br/>35 (3)<br/>1.4.3 A Comparison of the OSI and TCP Reference Models<br/>38 (2)<br/>1.4.4 A Critique of the OSI Model and Protocols<br/>40 (3)<br/>1.4.5 A Critique of the TCP/IP Reference Model<br/>43 (1)<br/>1.5 EXAMPLE NETWORKS<br/>44 (12)<br/>1.5.1 Novell NetWare<br/>45 (2)<br/>1.5.2 The ARPANET<br/>47 (3)<br/>1.5.3 NSFNET<br/>50 (2)<br/>1.5.4 The Internet<br/>52 (2)<br/>1.5.5 Gigabit Testbeds<br/>54 (2)<br/>1.6 EXAMPLE DATA COMMUNICATION SERVICES<br/>56 (10)<br/>1.6.1 SMDS--Switched Multimegabit Data Service<br/>57 (2)<br/>1.6.2 X.25 Networks<br/>59 (1)<br/>1.6.3 Frame Relay<br/>60 (1)<br/>1.6.4 Broadband ISDN and ATM<br/>61 (5)<br/>1.6.5 Comparison of Services<br/>66 (1)<br/>1.7 NETWORK STANDARDIZATION<br/>66 (6)<br/>1.7.1 Who's Who in the Telecommunications World<br/>67 (2)<br/>1.7.2 Who's Who in the International Standards World<br/>69 (1)<br/>1.7.3 Who's Who in the Internet Standards World<br/>70 (2)<br/>1.8 OUTLINE OF THE REST OF THE BOOK<br/>72 (1)<br/>1.9 SUMMARY<br/>73 (4)<br/>2 THE PHYSICAL LAYER<br/>77 (98)<br/>2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION<br/>77 (5)<br/>2.1.1 Fourier Analysis<br/>78 (1)<br/>2.1.2 Bandwidth-Limited Signals<br/>78 (3)<br/>2.1.3 The Maximum Data Rate of a Channel<br/>81 (1)<br/>2.2 TRANSMISSION MEDIA<br/>82 (12)<br/>2.2.1 Magnetic Media<br/>82 (1)<br/>2.2.2 Twisted Pair<br/>83 (1)<br/>2.2.3 Baseband Coaxial Cable<br/>84 (1)<br/>2.2.4 Broadband Coaxial Cable<br/>85 (2)<br/>2.2.5 Fiber Optics<br/>87 (7)<br/>2.3 WIRELESS TRANSMISSION<br/>94 (8)<br/>2.3.1 The Electromagnetic Spectrum<br/>94 (3)<br/>2.3.2 Radio Transmission<br/>97 (1)<br/>2.3.3 Microwave Transmission<br/>98 (2)<br/>2.3.4 Infrared and Millimeter Waves<br/>100 (1)<br/>2.3.5 Lightwave Transmission<br/>100 (2)<br/>2.4 THE TELEPHONE SYSTEM<br/>102 (37)<br/>2.4.1 Structure of the Telephone System<br/>103 (3)<br/>2.4.2 The Politics of Telephones<br/>106 (2)<br/>2.4.3 The Local Loop<br/>108 (10)<br/>2.4.4 Trunks and Multiplexing<br/>118 (12)<br/>2.4.5 Switching<br/>130 (9)<br/>2.5 NARROWBAND ISDN<br/>139 (5)<br/>2.5.1 ISDN Services<br/>140 (1)<br/>2.5.2 ISDN System Architecture<br/>140 (2)<br/>2.5.3 The ISDN Interface<br/>142 (1)<br/>2.5.4 Perspective on N-ISDN<br/>143 (1)<br/>2.6 BROADBAND ISDN AND ATM<br/>144 (11)<br/>2.6.1 Virtual Circuits versus Circuit Switching<br/>145 (1)<br/>2.6.2 Transmission in ATM Networks<br/>146 (1)<br/>2.6.3 ATM Switches<br/>147 (8)<br/>2.7 CELLULAR RADIO<br/>155 (8)<br/>2.7.1 Paging Systems<br/>155 (2)<br/>2.7.2 Cordless Telephones<br/>157 (1)<br/>2.7.3 Analog Cellular Telephones<br/>157 (5)<br/>2.7.4 Digital Cellular Telephones<br/>162 (1)<br/>2.7.5 Personal Communications Services<br/>162 (1)<br/>2.8 COMMUNICATION SATELLITES<br/>163 (7)<br/>2.8.1 Geosynchronous Satellites<br/>164 (3)<br/>2.8.2 Low-Orbit Satellites<br/>167 (1)<br/>2.8.3 Satellites versus Fiber<br/>168 (2)<br/>2.9 SUMMARY<br/>170 (5)<br/>3 THE DATA LINK LAYER<br/>175 (68)<br/>3.1 DATA LINK LAYER DESIGN ISSUES<br/>176 (7)<br/>3.1.1 Services Provided to the Network Layer<br/>176 (3)<br/>3.1.2 Framing<br/>179 (3)<br/>3.1.3 Error Control<br/>182 (1)<br/>3.1.4 Flow Control<br/>183 (1)<br/>3.2 ERROR DETECTION AND CORRECTION<br/>183 (7)<br/>3.2.1 Error-Correcting Codes<br/>184 (2)<br/>3.2.2 Error-Detecting Codes<br/>186 (4)<br/>3.3 ELEMENTARY DATA LINK PROTOCOLS<br/>190 (12)<br/>3.3.1 An Unrestricted Simplex Protocol<br/>195 (1)<br/>3.3.2 A Simplex Stop-and-Wait Protocol<br/>195 (2)<br/>3.3.3 A Simplex Protocol for a Noisy Channel<br/>197 (5)<br/>3.4 SLIDING WINDOW PROTOCOLS<br/>202 (17)<br/>3.4.1 A One Bit Sliding Window Protocol<br/>206 (1)<br/>3.4.2 A Protocol Using Go Back n<br/>207 (6)<br/>3.4.3 A Protocol Using Selective Repeat<br/>213 (6)<br/>3.5 PROTOCOL SPECIFICATION AND VERIFICATION<br/>219 (6)<br/>3.5.1 Finite State Machine Models<br/>219 (4)<br/>3.5.2 Petri Net Models<br/>223 (2)<br/>3.6 EXAMPLE DATA LINK PROTOCOLS<br/>225 (14)<br/>3.6.1 HDLC--High-level Data Link Control<br/>225 (4)<br/>3.6.2 The Data Link Layer in the Internet<br/>229 (6)<br/>3.6.3 The Data Link Layer in ATM<br/>235 (4)<br/>3.7 SUMMARY<br/>239 (4)<br/>4 THE MEDIUM ACCESS SUBLAYER<br/>243 (96)<br/>4.1 THE CHANNEL ALLOCATION PROBLEM<br/>244 (2)<br/>4.1.1 Static Channel Allocation in LANs and MANs<br/>244 (1)<br/>4.1.2 Dynamic Channel Allocation in LANs and MANs<br/>245 (1)<br/>4.2 MULTIPLE ACCESS PROTOCOLS<br/>246 (29)<br/>4.2.1 ALOHA<br/>246 (4)<br/>4.2.2 Carrier Sense Multiple Access Protocols<br/>250 (4)<br/>4.2.3 Collision-Free Protocols<br/>254 (2)<br/>4.2.4 Limited-Contention Protocols<br/>256 (4)<br/>4.2.5 Wavelength Division Multiple Access Protocols<br/>260 (2)<br/>4.2.6 Wireless LAN Protocols<br/>262 (4)<br/>4.2.7 Digital Cellular Radio<br/>266 (9)<br/>4.3 IEEE STANDARD 802 FOR LANS AND MANS<br/>275 (29)<br/>4.3.1 IEEE Standard 802.3 and Ethernet<br/>276 (11)<br/>4.3.2 IEEE Standard 802.4: Token Bus<br/>287 (5)<br/>4.3.3 IEEE Standard 802.5: Token Ring<br/>292 (7)<br/>4.3.4 Comparison of 802.3, 802.4, and 802.5<br/>299 (2)<br/>4.3.5 IEEE Standard 802.6: Distributed Queue Dual Bus<br/>301 (1)<br/>4.3.6 IEEE Standard 802.2: Logical Link Control<br/>302 (2)<br/>4.4 BRIDGES<br/>304 (14)<br/>4.4.1 Bridges from 802.x to 802.y<br/>307 (3)<br/>4.4.2 Transparent Bridges<br/>310 (4)<br/>4.4.3 Source Routing Bridges<br/>314 (2)<br/>4.4.4 Comparison of 802 Bridges<br/>316 (1)<br/>4.4.5 Remote Bridges<br/>317 (1)<br/>4.5 HIGH-SPEED LANS<br/>318 (9)<br/>4.5.1 FDDI<br/>319 (3)<br/>4.5.2 Fast Ethernet<br/>322 (3)<br/>4.5.3 HIPPI--High-Performance Parallel Interface<br/>325 (1)<br/>4.5.4 Fibre Channel<br/>326 (1)<br/>4.6 SATELLITE NETWORKS<br/>327 (6)<br/>4.6.1 Polling<br/>328 (1)<br/>4.6.2 ALOHA<br/>329 (1)<br/>4.6.3 FDM<br/>330 (1)<br/>4.6.4 TDM<br/>330 (3)<br/>4.6.5 CDMA<br/>333 (1)<br/>4.7 SUMMARY<br/>333 (6)<br/>5 THE NETWORK LAYER<br/>339 (140)<br/>5.1 NETWORK LAYER DESIGN ISSUES<br/>339 (6)<br/>5.1.1 Services Provided to the Transport Layer<br/>340 (2)<br/>5.1.2 Internal Organization of the Network Layer<br/>342 (2)<br/>5.1.3 Comparison of Virtual Circuit and Datagram Subnets<br/>344 (1)<br/>5.2 ROUTING ALGORITHMS<br/>345 (29)<br/>5.2.1 The Optimality Principle<br/>347 (2)<br/>5.2.2 Shortest Path Routing<br/>349 (2)<br/>5.2.3 Flooding<br/>351 (2)<br/>5.2.4 Flow-Based Routing<br/>353 (2)<br/>5.2.5 Distance Vector Routing<br/>355 (4)<br/>5.2.6 Link State Routing<br/>359 (6)<br/>5.2.7 Hierarchical Routing<br/>365 (2)<br/>5.2.8 Routing for Mobile Hosts<br/>367 (3)<br/>5.2.9 Broadcast Routing<br/>370 (2)<br/>5.2.10 Multicast Routing<br/>372 (2)<br/>5.3 CONGESTION CONTROL ALGORITHMS<br/>374 (22)<br/>5.3.1 General Principles of Congestion Control<br/>376 (2)<br/>5.3.2 Congestion Prevention Policies<br/>378 (1)<br/>5.3.3 Traffic Shaping<br/>379 (5)<br/>5.3.4 Flow Specifications<br/>384 (2)<br/>5.3.5 Congestion Control in Virtual Circuit Subnets<br/>386 (1)<br/>5.3.6 Choke Packets<br/>387 (3)<br/>5.3.7 Load Shedding<br/>390 (2)<br/>5.3.8 Jitter Control<br/>392 (1)<br/>5.3.9 Congestion Control for Multicasting<br/>393 (3)<br/>5.4 INTERNETWORKING<br/>396 (16)<br/>5.4.1 How Networks Differ<br/>399 (2)<br/>5.4.2 Concatenated Virtual Circuits<br/>401 (1)<br/>5.4.3 Connectionless Internetworking<br/>402 (2)<br/>5.4.4 Tunneling<br/>404 (1)<br/>5.4.5 Internetwork Routing<br/>405 (1)<br/>5.4.6 Fragmentation<br/>406 (4)<br/>5.4.7 Firewalls<br/>410 (2)<br/>5.5 THE NETWORK LAYER IN THE INTERNET<br/>412 (37)<br/>5.5.1 The IP Protocol<br/>413 (3)<br/>5.5.2 IP Addresses<br/>416 (1)<br/>5.5.3 Subnets<br/>417 (2)<br/>5.5.4 Internet Control Protocols<br/>419 (5)<br/>5.5.5 The Interior Gateway Routing Protocol: OSPF<br/>424 (5)<br/>5.5.6 The Exterior Gateway Routing Protocol: BGP<br/>429 (2)<br/>5.5.7 Internet Multicasting<br/>431 (1)<br/>5.5.8 Mobile IP<br/>432 (2)<br/>5.5.9 CIDR--Classless InterDomain Routing<br/>434 (3)<br/>5.5.10 IPv6<br/>437 (12)<br/>5.6 THE NETWORK LAYER IN ATM NETWORKS<br/>449 (24)<br/>5.6.1 Cell Formats<br/>450 (2)<br/>5.6.2 Connection Setup<br/>452 (3)<br/>5.6.3 Routing and Switching<br/>455 (3)<br/>5.6.4 Service Categories<br/>458 (2)<br/>5.6.5 Quality of Service<br/>460 (3)<br/>5.6.6 Traffic Shaping and Policing<br/>463 (4)<br/>5.6.7 Congestion Control<br/>467 (4)<br/>5.6.8 ATM LANs<br/>471 (2)<br/>5.7 SUMMARY<br/>473 (6)<br/>6 THE TRANSPORT LAYER<br/>479 (98)<br/>6.1 THE TRANSPORT SERVICE<br/>479 (9)<br/>6.1.1 Services Provided to the Upper Layers<br/>479 (2)<br/>6.1.2 Quality of Service<br/>481 (2)<br/>6.1.3 Transport Service Primitives<br/>483 (5)<br/>6.2 ELEMENTS OF TRANSPORT PROTOCOLS<br/>488 (22)<br/>6.2.1 Addressing<br/>489 (4)<br/>6.2.2 Establishing a Connection<br/>493 (5)<br/>6.2.3 Releasing a Connection<br/>498 (4)<br/>6.2.4 Flow Control and Buffering<br/>502 (4)<br/>6.2.5 Multiplexing<br/>506 (2)<br/>6.2.6 Crash Recovery<br/>508 (2)<br/>6.3 A SIMPLE TRANSPORT PROTOCOL<br/>510 (11)<br/>6.3.1 The Example Service Primitives<br/>510 (2)<br/>6.3.2 The Example Transport Entity<br/>512 (7)<br/>6.3.3 The Example as a Finite State Machine<br/>519 (2)<br/>6.4 THE INTERNET TRANSPORT PROTOCOLS (TCP AND UDP)<br/>521 (24)<br/>6.4.1 The TCP Service Model<br/>523 (1)<br/>6.4.2 The TCP Protocol<br/>524 (2)<br/>6.4.3 The TCP Segment Header<br/>526 (3)<br/>6.4.4 TCP Connection Management<br/>529 (4)<br/>6.4.5 TCP Transmission Policy<br/>533 (3)<br/>6.4.6 TCP Congestion Control<br/>536 (3)<br/>6.4.7 TCP Timer Management<br/>539 (3)<br/>6.4.8 UDP<br/>542 (1)<br/>6.4.9 Wireless TCP and UDP<br/>543 (2)<br/>6.5 THE ATM AAL LAYER PROTOCOLS<br/>545 (10)<br/>6.5.1 Structure of the ATM Adaptation Layer<br/>546 (1)<br/>6.5.2 AAL 1<br/>547 (2)<br/>6.5.3 AAL 2<br/>549 (1)<br/>6.5.4 AAL 3/4<br/>550 (2)<br/>6.5.5 AAL 5<br/>552 (2)<br/>6.5.6 Comparison of AAL Protocols<br/>554 (1)<br/>6.5.7 SSCOP--Service Specific Connection-Oriented Protocol<br/>555 (1)<br/>6.6 PERFORMANCE ISSUES<br/>555 (17)<br/>6.6.1 Performance Problems in Computer Networks<br/>556 (3)<br/>6.6.2 Measuring Network Performance<br/>559 (2)<br/>6.6.3 System Design for Better Performance<br/>561 (4)<br/>6.6.4 Fast TPDU Processing<br/>565 (3)<br/>6.6.5 Protocols for Gigabit Networks<br/>568 (4)<br/>6.7 SUMMARY<br/>572 (5)<br/>7 THE APPLICATION LAYER<br/>577 (190)<br/>7.1 NETWORK SECURITY<br/>577 (45)<br/>7.1.1 Traditional Cryptography<br/>580 (5)<br/>7.1.2 Two Fundamental Cryptographic Principles<br/>585 (2)<br/>7.1.3 Secret-Key Algorithms<br/>587 (10)<br/>7.1.4 Public-Key Algorithms<br/>597 (4)<br/>7.1.5 Authentication Protocols<br/>601 (12)<br/>7.1.6 Digital Signatures<br/>613 (7)<br/>7.1.7 Social Issues<br/>620 (2)<br/>7.2 DNS--DOMAIN NAME SYSTEM<br/>622 (8)<br/>7.2.1 The DNS Name Space<br/>622 (2)<br/>7.2.2 Resource Records<br/>624 (4)<br/>7.2.3 Name Servers<br/>628 (2)<br/>7.3 SNMP--SIMPLE NETWORK MANAGEMENT PROTOCOL<br/>630 (13)<br/>7.3.1 The SNMP Model<br/>631 (2)<br/>7.3.2 ASN.1--Abstract Syntax Notation 1<br/>633 (6)<br/>7.3.3 SMI--Structure of Management Information<br/>639 (2)<br/>7.3.4 The MIB--Management Information Base<br/>641 (1)<br/>7.3.5 The SNMP Protocol<br/>642 (1)<br/>7.4 ELECTRONIC MAIL<br/>643 (26)<br/>7.4.1 Architecture and Services<br/>645 (1)<br/>7.4.2 The User Agent<br/>646 (4)<br/>7.4.3 Message Formats<br/>650 (7)<br/>7.4.4 Message Transfer<br/>657 (6)<br/>7.4.5 Email Privacy<br/>663 (6)<br/>7.5 USENET NEWS<br/>669 (12)<br/>7.5.1 The User View of USENET<br/>670 (5)<br/>7.5.2 How USENET is Implemented<br/>675 (6)<br/>7.6 THE WORLD WIDE WEB<br/>681 (42)<br/>7.6.1 The Client Side<br/>682 (3)<br/>7.6.2 The Server Side<br/>685 (6)<br/>7.6.3 Writing a Web Page in HTML<br/>691 (15)<br/>7.6.4 Java<br/>706 (14)<br/>7.6.5 Locating Information on the Web<br/>720 (3)<br/>7.7 MULTIMEDIA<br/>723 (37)<br/>7.7.1 Audio<br/>724 (3)<br/>7.7.2 Video<br/>727 (3)<br/>7.7.3 Data Compression<br/>730 (14)<br/>7.7.4 Video on Demand<br/>744 (12)<br/>7.7.5 MBone--Multicast Backbone<br/>756 (4)<br/>7.8 SUMMARY<br/>760 (7)<br/>8 READING LIST AND BIBLIOGRAPHY<br/>767 (28)<br/>8.1 SUGGESTIONS FOR FURTHER READING<br/>767 (8)<br/>8.1.1 Introduction and General Works<br/>768 (1)<br/>8.1.2 The Physical Layer<br/>769 (1)<br/>8.1.3 The Data Link Layer<br/>770 (1)<br/>8.1.4 The Medium Access Control Sublayer<br/>770 (1)<br/>8.1.5 The Network Layer<br/>771 (1)<br/>8.1.6 The Transport Layer<br/>772 (1)<br/>8.1.7 The Application Layer<br/>772 (3)<br/>8.2 ALPHABETICAL BIBLIOGRAPHY<br/>775 (20)<br/>INDEX 795
520 ## - SUMMARY, ETC.
Summary, etc. This classic reference for students, and anyone who wants to know more about connectivity, has been totally rewritten to reflect the networks of the 1990s and beyond.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Not for loan Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Koha item type
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection 07/09/2015 DONATION 2742/D   TK5105.5 TAN BK0008907 10/01/2023 1 Books
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection   DONATION 2738/D   TK5105.5 TAN BK0008959 10/01/2023 2 Books
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection   DONATION 2737/D   TK5105.5 TAN BK0008990 10/01/2023 3 Books
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection   DONATION 2740/D   TK5105.5 TAN BK0009020 10/01/2023 4 Books
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library Office C11 adjacent to Library exit   DONATION 2743/D   TK5105.5 TAN BK0008955 10/01/2023 5 Books
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection   DONATION 2937/D   TK5105.5 TAN BK0008929 10/01/2023 6 Books
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection   DONATION 2744/D   5105.5 TAN BK0008737 10/01/2023 7 Books
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection   DONATION 2741/D   TK5105.5 TAN   10/01/2023 8 Books