Search the Library Catalogue
Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|
Anna Centenary Library | QA76.9.A25 F34 2005 005.8 (Browse shelf(Opens below)) | Available | 294970 | ||
Anna Centenary Library | QA76.9.A25 F34 2005 005.8 (Browse shelf(Opens below)) | Available | 295974 |
QA76.9.A25 B79 2005 005.8 Cryptography, information theory, and error-correction : a handbook for the 21st century | QA76.9.A25 C369 2005 363.25 File system forensic analysis | QA76.9.A25 F34 2005 005.8 Forensic discovery | QA76.9.A25 F34 2005 005.8 Forensic discovery | QA76.9.A25 F7347 2007 005.8 Cisco network admission control. Vol. 2, Deployment and troubleshooting | QA76.9.A25 G743 2008 005.8 Gray hat hacking : the ethical hacker's handbook | QA76.9.A25 H635 2004 005.8 Exploiting software : how to break code |
Includes bibliographical references (p. 199-206) and index
There are no comments on this title.