Item type | Current library | Collection | Call number | Status | Notes | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
AVIT Central Library | Purchased | 005.8 SHY-C (Browse shelf(Opens below)) | Available | 30144773 | 42586 | ||
![]() |
AVIT Central Library | Purchased | 005.8 SHY-C (Browse shelf(Opens below)) | Available | 30144773 | 42588 | ||
![]() |
AVIT Central Library | Purchased | 005.8 SHY-C (Browse shelf(Opens below)) | Available | 30144773 | 42587 |
005.8 RAM-I Internet if Things: Architecture Implementation and Security | 005.8 RAN-H Hacking Exposed | 005.8 SHA-E Ethically hacking an industrial control system: Analyzing Exploiting Mitigating and Safeguarding Industrial Processes for an Ethical Hacker | 005.8 SHY-C Cryptography and Security | 005.8 SHY-C Cryptography and Security | 005.8 SHY-C Cryptography and Security | 005.8 STA-C Computer Security:Principles and Practice |
There are no comments on this title.