Authentication codes and combinatorial designs / Dingyi Pei.
Material type:
- text
- unmediated
- volume
- 1584884738
- QA76.9.A25 .P44 2006
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books - Printed | PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH Main Library General | QA76.9.A25 .P44 2006 (Browse shelf(Opens below)) | Available | 1000179371 |
Browsing PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH shelves, Shelving location: Main Library General Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9.A25 .O89 2008 OS X Exploits and defense / | QA76.9.A25 .P344 2007 PCI compliance : understand and implement effective PCI data security standard compliance / | QA76.9.A25 .P44 2004 Information security policies and procedures : a practitoner's reference / | QA76.9.A25 .P44 2006 Authentication codes and combinatorial designs / | QA76.9.A25 .P444 2002 Information security policies, procedures and standards : guidelines for effective information security management / | QA76.9.A25 .P47 2006 Data protection and information lifecycle management / | QA76.9.A25 .P53 2002 Fundamentals of computer security / |
1 3
There are no comments on this title.
Log in to your account to post a comment.