Applied cryptography : protocols, algorithms and source code in C.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 997151348X :
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Kabarak, Main Campus | QA76.9 .A25S36 1996 (Browse shelf(Opens below)) | Available | 003230 | ||
![]() |
Kabarak, Main Campus | QA76.9 .A25S36 1996 (Browse shelf(Opens below)) | Available | 003231 | ||
![]() |
Kabarak, Nakuru City Campus | QA76.9 .A25S36 1996 (Browse shelf(Opens below)) | Available | 005611 |
Browsing Kabarak, Main Campus shelves Close shelf browser (Hides shelf browser)
QA76.9 .A25P45 2015 c.2 Security in Computing | QA76.9 .A25P87 2004 c. 1 A Practical guide to managing information security / | QA76.9 .A25S36 1996 Applied cryptography : | QA76.9 .A25S36 1996 Applied cryptography : | QA76.9 .A25V33 Computer forensics : | QA76.9 .A25V33 2005 c. 1 Computer forensics : | QA76.9 .A25V33 2005 c. 2 Computer forensics : |
There are no comments on this title.
Log in to your account to post a comment.