Information security management handbook Part-2

By: Tipton, Harold FContributor(s): Krause,MickiMaterial type: TextTextPublisher: New York Ayerban Publication 2014Edition: 5th EdDescription: V.pSubject(s): MANAGEMENT | USE OF CRYPTOGRAPHY,CRYPTOGRAPHY CONCEPTS METHODOLOGIES AND PRACTICES,PRIVATE KEY ALGORITHMS,PUBLIC KEY INFRASTRUCTURE,METHODS OF ATTACKDDC classification: 658.0058
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
Books Books SGT Engineering Library
658.0058 TIP P-4 (Browse shelf) Available FE6174
Books Books SGT Engineering Library
658.0058 TIP P-7 (Browse shelf) Available FE6196
Books Books SGT Engineering Library
658.0058 TIP P-1 (Browse shelf) Available FE6207
Books Books SGT Engineering Library
658.0058 TIP P-1 (Browse shelf) Available FE6208
Books Books SGT Engineering Library
658.0058 TIP P-3 (Browse shelf) Available FE6209
Books Books SGT Engineering Library
658.0058 TIP P-1 (Browse shelf) Available FE6210
Books Books SGT Engineering Library
658.0058 TIP P-1 (Browse shelf) Available FE6223
Books Books SGT Engineering Library
658.0058 TIP P-8 (Browse shelf) Available FE6224
Books Books SGT Engineering Library
658.0058 TIP P-4 (Browse shelf) Available FE6225
Books Books SGT Engineering Library
658.0558 TIP P-2 (Browse shelf) Available FE6239

There are no comments on this title.

to post a comment.