Security and privacy in user modeling / Jorg Schreck.
Material type:
- text
- unmediated
- volume
- 140201130X
- QA76.9 .A25 .S33 2003
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books - Printed | PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH Main Library General | QA76.9 .A25 .S33 2003 (Browse shelf(Opens below)) | Available | 1000115019 |
Browsing PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH shelves, Shelving location: Main Library General Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9 .A25 .L82 1998 Basic methods of cryptography / | QA76.9 .A25 .M46 1997 Handbook of applied cryptography / | QA76.9 .A25 .R68 2000 UNIX system security tools / | QA76.9 .A25 .S33 2003 Security and privacy in user modeling / | QA76.9 .A25 .S34 2001 Hacker's challenge : test your incident response skills using 20 scenarios / | QA76.9 .A25 .W33 2003 Cryptanalysis of number theoretic ciphers / | QA 76.9 .A25 S246 2016 c.1 Introduction to Food Engineering / |
1 3
There are no comments on this title.
Log in to your account to post a comment.