Cryptography in the Database Kevin Kenan The Last Line of Defense
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 8131706710
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Goa University Library General Stacks 2 | 005.82 KEN/Cry (Browse shelf(Opens below)) | Available | 117776 |
Browsing Goa University Library shelves, Shelving location: General Stacks 2 Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
No cover image available No cover image available |
![]() |
![]() |
||
005.8 TAL/CHA Architecting Secure Software Systems | 005.82 BUC/Int Introduction to cryptography / | 005.82 DEL-KNE Introduction to cryptography : | 005.82 KEN/Cry Cryptography in the Database | 005.82 MOY-KEL Cryptographic Libraries for developers (with C D) | 005.82 STA/Int Introduction to cryptography with mathematical foundations and computer implementations / | 005.82 WAY/Dis Disappearing cryptography : |
Includes Bibliography, Glossary and Index
There are no comments on this title.
Log in to your account to post a comment.