Cryptographic security architecture : design and verification / Peter Gutmann.
Material type:
- text
- unmediated
- volume
- 0387953876
- QA76.9.A25 .G87 2004
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books - Printed | PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH Main Library General | QA76.9.A25 .G87 2004 (Browse shelf(Opens below)) | Available | 1000099157 |
Browsing PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH shelves, Shelving location: Main Library General Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9.A25 .G72 2011 Gray hat hacking : the ethical hacker's handbook / | QA76.9.A25 .G74 2007 Windows Vista Security : securing Vista against malicious attacks / | QA76.9.A25 .G84 2004 Guide to computer forensics and investigation / | QA76.9.A25 .G87 2004 Cryptographic security architecture : design and verification / | QA76.9.A25 .H32 2006 Hacker's challenge 3 : 20 brand-new forensic scenarios and solutions / | QA76.9.A25 .H34 2009 Professional ASP.NET 3.5 security, membership and role management with C# and VB / | QA76.9.A25 .H35 2010 IT security metrics : a practical framework for measuring security and protecting data / |
1 3
There are no comments on this title.
Log in to your account to post a comment.