FUNDAMENTALS OF COMPUTER SECURITY
Material type:
- QA 76.9.A25 .P54 2010
Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Kisii University Library On Display | Science & Technology | QA 76.9 .A25 P54 2010 (Browse shelf(Opens below)) | 1 | Available | 012060 |
Browsing Kisii University Library shelves, Shelving location: On Display, Collection: Science & Technology Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | |||
QA 76.9 .A25 P36 2004 CORPORATE COMPUTER AND NETWORK SECURITY | QA 76.9 .A25 P46 2006 PENETRATION TESTER'S OPEN SOURCE TOOLKIT | QA 76.9 .A25 P54 2010 FUNDAMENTALS OF COMPUTER SECURITY | QA 76.9 .A25 P54 2010 FUNDAMENTALS OF COMPUTER SECURITY | QA 76.9 .A25 P54 2010 FUNDAMENTALS OF COMPUTER SECURITY | QA 76.9 .A25 P54 2010 FUNDAMENTALS OF COMPUTER SECURITY | QA 76.9 A25 R37 2021 CYBERSECURITY AND THIRD-PARTY RISK: THIRD PARTY THREAT HUNTING |
There are no comments on this title.
Log in to your account to post a comment.