Item type | Current library | Call number | Materials specified | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
Book | Sri Krishna College of Engineering and Technology RACK 15 / SHELF 26 | 005.8 (MCA) (Browse shelf(Opens below)) | HARD BINDING | Available | MCA | 28785 |
Browsing Sri Krishna College of Engineering and Technology shelves, Shelving location: RACK 15 / SHELF 26 Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
005.8 (MCA) EXTREME EXPLOITS : ADVANCED DEFENSES AGAINST HARDCORE HACKS | 005.8 (MCA) DIGITAL SIGNATURE : NETWORK SECURITY PRACTICES | 005.8 (MCA) GYA SECURING IIS 6.0 | 005.8 (MCA) CYBER ADVERSARY CHARACTERIZATION : AUDITING THE HACKER MIND | 005.8 (MCA) SECURING IM AND P2P APPLICATIONS FOR THE ENTERPRISE | 005.8 (MCA) HARDWARE HACKING PROJECTS FOR GEEKS | 005.8 (MCA) KERBEROS THE DEFINITIVE GUIDE |
There are no comments on this title.