Security Policies and Implementation Issues Rob Johnson
Material type: TextPublication details: UK Jones and Bartlett 2011Description: xvii, 473pISBN: 9780763791322Subject(s): Computer securityDDC classification: 005.8 KIMItem type | Current library | Collection | Call number | Vol info | Status | Notes | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|---|
TEXT BOOK | LRC_JUIT Computer Science & Engineering | TEXTBOOK SECTION | 005.8 JOH (Browse shelf (Opens below)) | Copy 1 | Available | FY: 2011-12 | 026233 |
Total holds: 0
Browsing LRC_JUIT shelves, Shelving location: Computer Science & Engineering, Collection: TEXTBOOK SECTION Close shelf browser (Hides shelf browser)
No cover image available No cover image available | No cover image available No cover image available | |||||||
005.8 JAM Phishing Exposed | 005.8 JAM Phishing Exposed | 005.8 JAV Optical and Digital Techniques for Information Security | 005.8 JOH Security Policies and Implementation Issues | 005.8 KEN Metasploit | 005.8 KIZ Computer Network Security | 005.8 KIZ Computer Network Security |
There are no comments on this title.