"Guide to the records, 1682-1835 3V"
By: Contributor(s): Material type:
TextLanguage: English Publication details: Madras "Suptd, Govt Press " 1935Subject(s): DDC classification: - "V2182.M35<--K82, G5.1-G5.3/GD"
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reference
|
Ratan Tata Library | Ratan Tata Library | "V2182.M35<--K82 G5.1-G5.3/GD" (Browse shelf(Opens below)) | Not for loan | RT0052212 |
There are no comments on this title.
Log in to your account to post a comment.
-
1
802.11 WLANs and IP networking : security,QoS and mobility
by Prasad Anand R -
2
Access control security and trust: A logical approach
by Chin Shiu-Kai -
3
Ad Hoc Networks Telecommunications and Game Theory
by Benslama, Malek -
4
Adaptive cryptographic access control
by kayem Anne VDM; Akl Selim G; Martin Patrick; Osborn Sylvia L Gu. -
5
Adaptive security management architecture
by Tiller James S -
6
Advances in Artificial Intelligence for Privacy Protection and Security
by Solanas Agusti Et Al -
7
Advances in computer security management
by Rullo Thomas A Ed. -
8
Advances in Computer Security Management
by Rullo T A -
9
Advances in computer system security
by Turn Rein Ed. -
10
Advances in Decision Sciences, Image Processing, Security and Computer Vision
by Suresh Chandra Satapathy, K. Srujan Raju, K. Shyamala, D. Rama Krishna, Margarita N. Favorskaya -
11
Advances in Decision Sciences, Image Processing, Security and Computer Vision
by Suresh Chandra Satapathy, K. Srujan Raju, K. Shyamala, D. Rama Krishna, Margarita N. Favorskaya -
12
Advances in Information and Computer Security
by Chen-Mou Cheng, Mitsuaki Akiyama -
13
Advances in Information and Computer Security
by Toru Nakanishi, Ryo Nojima -
14
Advances in Information and Computer Security
by Kazumaro Aoki, Akira Kanaoka -
15
Advances in Information and Computer Security
by Nuttapong Attrapadung, Takeshi Yagi -
16
Advances in Information and Computer Security
by Atsuo Inomata, Kan Yasuda -
17
Advances in Information and Computer Security
by Kazuto Ogawa, Katsunari Yoshioka -
18
Advances in Information and Computer Security
by Satoshi Obana, Koji Chida -
19
Adversarial machine learning
by Joseph Anthony D -
20
Algorithmic cryptanalysis
by Joux Antoine -
21
Algorithms, Architectures and Information Systems Security
by Bhattacharya Bhargab B Et Al -
22
An information security handbook
by Hunter John M D -
23
Analyzing Computer Security
by Pfleegar -
24
Analyzing computer security
by Pfleeger Charles P. -
25
Andraid security : attacks and defenses
by Dubey Abhishek; Mishra Anmol -
26
Applications of data mining in computer security
by Barbara Daniel Ed. -
27
Applied cryptography: protocols, algorithms, and source code in C
by Schneier Bruce -
28
The Art of War for Computer Security
by Tom Madsen -
29
Artificial immune system: Applications in computer security
by Tan Ying -
30
Artificial intelligence safety and security
by Yampolskiy Roman V Ed. -
31
Assessment frameworks in software security and raliability engineering Ruchi sharma
by Shama Ruchi Au. -
32
Big book of IPsec RFCs
by Loshin Pete Comp -
33
Big data analytics in cyber security
by Savas Onur -
34
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
by Sergei Petrenko -
35
Biometrics and network security
by Reid Paul -
36
Biometrics and network security
by Reid Paul -
37
Biometrics, computer security systems and artificial intelligence applications
by Saeed Khalid Ed. -
38
Bluetooth security
by Gehrmann Christian -
39
Body area network : safety, security and sustainability
by Gupta Sandeep Kumar Shrinath; Mukherjee Tridib; Venkatasubramanian Krishna Kumar -
40
Broadband wireless access and local networks: Mobile wimax and wifi
by Lee Byeong Gi -
41
Case studies in secure computing
-
42
Classical introduction to cryptography: Applications for communications security
by Vaudenay Serge -
43
Cloud computing security: Foundations and challenges
by Vacca John R Ed. -
44
Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the "Internet of Things"
by Brooks Tyson R -
45
Collaboration with cloud computing : security social media and unified communications
by Messier Ric -
46
Collaboration with cloud computing :security,social media and unified communications
by Messier Ric -
47
Collaborative computer security and trust management
by Seigneur Jean-Marc -
48
Comparative study of classification algorithms for network intrusion detection
by Wang Yunling -
49
Complexity and cryptography: An introduction
by Talbot John -
50
Comprehensive guide to 5G security
by Liyanage Madhuysanka Ed.
"Guide to the records, 1682-1835 3V"
APA
"Madras M. D., "Madras M. D., . (1935). "Guide to the records, 1682-1835 3V". Madras: "Suptd, Govt Press ".
Chicago
"Madras Masulipatam District", "Madras Masulipatam District", . 1935. "Guide to the records, 1682-1835 3V". Madras: "Suptd, Govt Press ".
Harvard
"Madras M. D., "Madras M. D., . (1935). "Guide to the records, 1682-1835 3V". Madras: "Suptd, Govt Press ".
MLA
"Madras Masulipatam District", "Madras Masulipatam District", . "Guide to the records, 1682-1835 3V". Madras: "Suptd, Govt Press ". 1935.
