Search the Library Catalogue
Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|
Anna Centenary Library | QA76.9.A25 P45 2007 005.8 (Browse shelf(Opens below)) | Available | 296318 |
QA76.9.A25 H635 2004 005.8 Exploiting software : how to break code | QA76.9.A25 H635 2004 005.8 Exploiting software : how to break code | QA76.9.A25 I563 2000 005.8 Designing privacy enhancing technologies : international workshop on design issues in anonymity and unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings | QA76.9.A25 P45 2007 005.8 Security in computing | QA76.9.A25 S3 2008 005.8 Hacking exposed Windows : Windows security secrets & solutions | QA76.9.A25 S3 2008 005.8 Hacking exposed Windows : Windows security secrets & solutions | QA76.9.A25 S35 1996 005.8/2 Applied cryptography : protocols, algorithms, and source code in C |
Includes bibliographical references (p. 782-814) and index
There are no comments on this title.