Security in Computing / [textbook] by Pfleeger Charles and Shari Lawrence
Material type:
- QA76.9.A25 PFL
Item type | Current library | Home library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
Harare Institute of Technology Main Library | Harare Institute of Technology Main Library | General Collection | QA76.9.A25 PFL (Browse shelf(Opens below)) | 1 | Available | bk0002656 | ||
![]() |
Harare Institute of Technology Main Library | Harare Institute of Technology Main Library | General Collection | QA76.9.A25 PFL (Browse shelf(Opens below)) | 2 | Available | bk0008945 |
Browsing Harare Institute of Technology Main Library shelves, Shelving location: General Collection Close shelf browser (Hides shelf browser)
![]() |
![]() |
No cover image available | No cover image available | No cover image available |
![]() |
![]() |
||
QA76.9.A25 HAS Data hiding techniques in Windows OS : a practical approach to investigation and defense / | QA76.9.A25 MEE Cybersecurity for beginners / | QA76.9.A25 PFL Security in Computing / | QA76.9.A25 PFL Security in Computing / | QA76.9.A25 SAL Elements of computer security / | QA76.9.A25 SCH Applied cryptography : protocols, algorithms, and source code in C / | QA76.9.A25 SCH Applied cryptography : protocols, algorithms, and source code in C / |
bibliographic reference and index.
There are no comments on this title.
Log in to your account to post a comment.