Applied cryptography : protocols, algorithms and source code in C.
Material type:
TextPublication details: New York : John Wiley, 1996.Edition: 2nd edDescription: xxiii, 758 pISBN: - 997151348X :
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
General Collection
|
Kabarak, Main Campus | QA76.9 .A25S36 1996 (Browse shelf(Opens below)) | Available | 003230 | ||||||||||||||
General Collection
|
Kabarak, Main Campus | QA76.9 .A25S36 1996 (Browse shelf(Opens below)) | Available | 003231 | ||||||||||||||
General Collection
|
Kabarak, Nakuru City Campus | QA76.9 .A25S36 1996 (Browse shelf(Opens below)) | Available | 005611 |
Browsing Kabarak, Main Campus shelves Close shelf browser (Hides shelf browser)
| QA76.9 .A25P45 2015 c.2 Security in Computing | QA76.9 .A25P87 2004 c. 1 A Practical guide to managing information security / | QA76.9 .A25S36 1996 Applied cryptography : | QA76.9 .A25S36 1996 Applied cryptography : | QA76.9 .A25V33 Computer forensics : | QA76.9 .A25V33 2005 c. 1 Computer forensics : | QA76.9 .A25V33 2005 c. 2 Computer forensics : |
There are no comments on this title.
Log in to your account to post a comment.