CYBERSECURITY STRATEGIES AND BEST PRACTICES
Material type:
TextPublication details: BIRMINGHAM PACKT PUBLISHING 2024Edition: 1ST EDITIONDescription: XVII,233PISBN: - 978-1-80323-005-4
- TK 5105.59 .A85 2024 1
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Long Loan Book
|
Kisii University Library On Display | Science & Technology | TK 5105.59 .A85 2024 (Browse shelf(Opens below)) | 1 | Available | A000395 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | TK 5105.59 .A85 2024 (Browse shelf(Opens below)) | 2 | Available | A000396 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | TK 5105.59 .A85 2024 (Browse shelf(Opens below)) | 3 | Available | A000544 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | TK 5105.59 .A85 2024 (Browse shelf(Opens below)) | 4 | Available | A000546 | ||||||||||||
Long Loan Book
|
Kisii University Library On Display | Science & Technology | TK 5105.59 .A85 2024 (Browse shelf(Opens below)) | 5 | Available | A000367 |
Browsing Kisii University Library shelves,Shelving location: On Display,Collection: Science & Technology Close shelf browser (Hides shelf browser)
| No cover image available | No cover image available | |||||||
| TK 5105.588 .H36 2002 DEVELOPING ONLINE CONTENT: THE PRINCIPLES OF WRITING AND EDITING FOR THE WEB | TK 5105.59 .A3863 2014 INFORMATION SECURITY AND IT RISK MANAGEMENT | TK 5105.59 .A85 2024 CYBERSECURITY STRATEGIES AND BEST PRACTICES | TK 5105.59 .A85 2024 CYBERSECURITY STRATEGIES AND BEST PRACTICES | TK 5105.59 .A85 2024 CYBERSECURITY STRATEGIES AND BEST PRACTICES | TK 5105.59 .A85 2024 CYBERSECURITY STRATEGIES AND BEST PRACTICES | TK 5105.59 .A85 2024 CYBERSECURITY STRATEGIES AND BEST PRACTICES |
INCLUDES INDEX
There are no comments on this title.
Log in to your account to post a comment.