CYBERSECURITY AND THIRD-PARTY RISK: THIRD PARTY THREAT HUNTING
Material type:
TextPublication details: NEW JERSEY JOHN WILEYDescription: XXII,458PISBN: - 978-1-119-80955-5
- QA 76.9 .A25 R37 2021 C.1
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Long Loan Book
|
Kisii University Library On Display | Science & Technology | QA 76.9 .A25 R37 2021 (Browse shelf(Opens below)) | 2 | Available | 50926 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | QA 76.9 .A25 R37 2021 (Browse shelf(Opens below)) | 3 | Available | 50946 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | QA 76.9 .A25 R37 2021 (Browse shelf(Opens below)) | 4 | Available | 50942 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | QA 76.9 .A25 R37 2021 (Browse shelf(Opens below)) | 5 | Available | 50934 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | QA 76.9 .A25 R37 2021 (Browse shelf(Opens below)) | 6 | Available | 50930 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | QA 76.9 A25 R37 2021 (Browse shelf(Opens below)) | C.1 | Available | 000000020903 |
Browsing Kisii University Library shelves,Shelving location: On Display,Collection: Science & Technology Close shelf browser (Hides shelf browser)
| QA 76.9 .A25 R37 2021 CYBERSECURITY AND THIRD-PARTY RISK: THIRD PARTY THREAT HUNTING | QA 76.9 .A25 R37 2021 CYBERSECURITY AND THIRD-PARTY RISK: THIRD PARTY THREAT HUNTING | QA 76.9 .A25 R37 2021 CYBERSECURITY AND THIRD-PARTY RISK: THIRD PARTY THREAT HUNTING | QA 76.9 .A25 R37 2021 CYBERSECURITY AND THIRD-PARTY RISK: THIRD PARTY THREAT HUNTING | QA 76.9.A25 S36 1996 APPLIED CRYPTOGRAPHY PROTOCOLS,ALGORITHMS,AND SOURCE CODE IN C | QA 76.9.A25 S36 1996 APPLIED CRYPTOGRAPHY PROTOCOLS,ALGORITHMS,AND SOURCE CODE IN C | QA 76.9.A25 S36 1996 APPLIED CRYPTOGRAPHY PROTOCOLS,ALGORITHMS,AND SOURCE CODE IN C |
INCLUDES INDEX
There are no comments on this title.
Log in to your account to post a comment.