Computer and intrusion forensics / George Mohay ... [and others].
Material type:
- text
- unmediated
- volume
- 1580533698
- QA76.9.A25 .C65 2003
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books - Printed | PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH | QA76.9.A25 .C65 2003 (Browse shelf(Opens below)) | Available | 1000090237 |
Browsing PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH shelves Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9 .D3 .I53 2002 Information and database quality / | QA76.9 .D3 .I67 2002 Intelligent support systems : knowledge management / | QA76.9 .D3 .K69 1997 Database system concepts / | QA76.9.A25 .C65 2003 Computer and intrusion forensics / | QA76.9.A25 .H44 2001 Securing e-business applications and communications / | QA76.9.A25 .H63 2006 Rootkits : subverting the Windows kernel / | QA76.9.A25 .H68 2005 19 deadly sins of software security : programming flaws and how to fix them / |
1 3
There are no comments on this title.
Log in to your account to post a comment.