Information security and ethics : concepts, methodologies, tools, and applications / Hamid Nemati.
Material type:
- text
- unmediated
- volume
- 1599049373
- QA76.9.A25 .N45 2008
Item type | Current library | Call number | Vol info | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books - Printed | PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH Main Library General | QA76.9.A25 .N45 2008 (Browse shelf(Opens below)) | Available | 1000203072 | |||
Books - Printed | PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH Main Library General | QA76.9.A25 .N45 2008 (Browse shelf(Opens below)) | Volume 3 | Available | 1000203069 | ||
Books - Printed | PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH Main Library General | QA76.9.A25 .N45 2008 (Browse shelf(Opens below)) | Volume 5 | Available | 1000203071 |
Browsing PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH shelves, Shelving location: Main Library General Close shelf browser (Hides shelf browser)
![]() |
No cover image available | No cover image available | No cover image available |
![]() |
![]() |
![]() |
||
QA76.9.A25 .N39 2004 Defense and detection strategies against internet worms / | QA76.9.A25 .N45 2008 Information security and ethics : concepts, methodologies, tools, and applications / | QA76.9.A25 .N45 2008 Information security and ethics : concepts, methodologies, tools, and applications / | QA76.9.A25 .N45 2008 Information security and ethics : concepts, methodologies, tools, and applications / | QA76.9.A25 .N52 2011 Security patch management / | QA76.9.A25 .N53 2003 UMTS security / | QA76.9.A25 .O54 2004 Information technology security : advice from experts / |
1 3
There are no comments on this title.
Log in to your account to post a comment.