ACCESS CONTROL, SECURITY, AND TRUST A LOGICAL APPROACH
Material type:
- 978-1-584888-62-8
- QA 76.9 .A 25 C 495 2011 1
Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Kisii University Library On Display | Science & Technology | QA 76.9 .A 25 .C 495 2011 (Browse shelf(Opens below)) | 1 | Available | 000000012095 | |
![]() |
Kisii University Library On Display | Science & Technology | QA 76.9 .A 25 .C 495 2011 (Browse shelf(Opens below)) | 2 | Available | 000000012094 |
Browsing Kisii University Library shelves, Shelving location: On Display, Collection: Science & Technology Close shelf browser (Hides shelf browser)
QA 76.9 .A25 A22 2008 ACCESS DENIED THE PRACTICE AND POLICY OF GLOBAL INTERNET FILTERING | QA 76.9 .A25A53 2020 SECURITY ENGINEERING: A GUIDE TO BUILDING DEPENDABLE DISTRIBUTED SYSTEMS | QA 76.9 .A 25 .C 495 2011 ACCESS CONTROL, SECURITY, AND TRUST A LOGICAL APPROACH | QA 76.9 .A 25 .C 495 2011 ACCESS CONTROL, SECURITY, AND TRUST A LOGICAL APPROACH | QA76.9 .A25 C66 2017 COMPUTER AND INFORMATION SECURITY | QA76.9 .A25 C66 2017 COMPUTER AND INFORMATION SECURITY | QA 76.9 .A25C93 2012 CYBER SECURITY POLICY GUIDEBOOK |
INCLUDES BIBLIOGRAPHICAL REFERENCES AND INDEX
There are no comments on this title.
Log in to your account to post a comment.