Contemporary cryptoloty : the science of information integrity
Material type:
TextPublication details: New York, N.Y. : IEEE Press, 1992Description: 640ISBN: - 0780353528
- QA76.9 .A25 C667
Books
| Home library | Collection | Shelving location | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
| BU Library and Learning Space | Books (CNFIC) | Closed Shelves (Contact Library Staff) | QA76.9 .A25 C667 (Browse shelf(Opens below)) | Available | 140920010045 |
Total holds: 0
Browsing BU Library and Learning Space shelves Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| QA76.9 .A25 C447H Hack attacks revealed : a complete reference with custom security hacking toolkit / | QA76.9 .A25 C447H 2002 Hack attacks revealed : a complete reference for UNIX, Windows, and Linux with custom security toolkit / | QA76.9 .A25 C447H 2002 Hack attacks denied : a complete guide to network lockdown for UNIX, Windows, and Linux / | QA76.9 .A25 C667 Contemporary cryptoloty : the science of information integrity | QA 76.9 .A25 C923 Cyber security policy guidebook / | QA76.9.A25 D384P Protecting games : a security handbook for game developers and publishers / | QA76.9 .A25 D444P Principles of information systems security : text and cases / |
There are no comments on this title.
Log in to your account to post a comment.
