"Fourth five year plan, 1969-74"
By: Contributor(s): Material type:
TextLanguage: English Series: ; iPublication details: Delhi India Information and Broadcasting India 1974Description: 357p. cmSubject(s): DDC classification: - "z.2.N66t5, GD"
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reports
|
Ratan Tata Library | Ratan Tata Library | "z.2.N66t5 GD" (Browse shelf(Opens below)) | i | Available | RT00055523 Ref |
1974 (357p)
There are no comments on this title.
-
1
5G NR, Wi-Fi 6, and bluetooth LE 5: A prime on smartphone wireless technologies
by Morais, Douglas H -
2
Accessing information through internet
by Nair R Raman -
3
Adaptive technology for the internet: making electronic resources accessible to all
by Mates Barbara T -
4
Advanced artificial intelligence
by Shi Zhongzhi -
5
Advanced Wireless Communications and Internet
by Glisic, Savo G. -
6
Al morality
-
7
Architecture of network systems
by Serpanos Dimitrios; Wolf Tilman -
8
Big book of IPsec RFCs
by Loshin Pete Comp -
9
Biz talk: implementing business to business e-commerce
by Kobielus James G -
10
Building the internet of things with IPv6 and MIPv6
by Minoli Daniel -
11
Business process orientation: gaining the e-business competitive advantage
by McCormack Kevin P -
12
Business web strategy:design, alignment and application
by Al- Hakim Latif -
13
Cases on global e-learning practices:successis and pitfalls
by Sharma Ramesh C -
14
Chinese Cyber Nationalism
by Wu Xu -
15
Cloud and fog computing in 5G mobile networks: Emerging advances and applications
by Markakis Evangelos Ed. -
16
Complete handbook of the internet
by Buchanan W J -
17
Complete handbook of the internet
by Buchanan W J -
18
Complex networks
by Erciyes Kayhan -
19
Computer security literacy staying safe in a digital world
by Jacobson Douglas; Idziorek Joseph -
20
Computers, Internet and New Technology Laws
by Seth Karnika -
21
Cryptography and network security: Principles and practice
by Stallings William -
22
Cryptography and network security: Principles and practice
by Stallings William -
23
Cryptography and network security: Principles and practice
by Stallings William -
24
Cryptography and network security: Principles and practice
by Stallings William -
25
Cryptography and network security: Principles and practice
by Stallings William -
26
Cryptography and network security: Principles and practice
by Stallings William -
27
Cryptography and network security: Principles and practice
by Stallings William -
28
Cryptography and network security: Principles and practice
by Stallings William -
29
Cryptography and network security: Principles and practice
by Stallings William -
30
Cryptography and network security: Principles and practice
by Stallings William -
31
Cryptography and network security: Principles and practice
by Stallings William -
32
Cryptography and network security: Principles and practice
by Stallings William -
33
Cryptography and network security: Principles and practice
by Stallings William -
34
Cryptography and network security: Principles and practice
by Stallings William -
35
Cryptography and network security: Principles and practice
by Stallings William -
36
Cryptography and network security: Principles and practice
by Stallings William -
37
Cryptography and network security: Principles and practice
by Stallings William -
38
Cryptography and network security: Principles and practice
by Stallings William -
39
Cryptography and network security: Principles and practice
by Stallings William -
40
Cryptography and network security: Principles and practice
by Stallings William -
41
Cryptography and network security: Principles and practice
by Stallings William -
42
Cryptography and network security: Principles and practice
by Stallings William -
43
Cryptography and network security: Principles and practice
by Stallings William -
44
Cryptography and network security: Principles and practice
by Stallings William -
45
Cryptography and network security: Principles and practice
by Stallings William -
46
Cryptography and network security: Principles and practice
by Stallings William -
47
Cryptography and network security: Principles and practice
by Stallings William -
48
Cyber China
by Mengin Francoise Ed. -
49
Cyber crimes: a primer on internet threats and email abuses
by Kumar G Ram -
50
Cyber crimes: a primer on internet threats and email abuses
by Kumar G Ram
"Fourth five year plan, 1969-74"
APA
India Information And Broadcasting (M/O-), India Information And Broadcasting (M/O-), . (1974). "Fourth five year plan, 1969-74". Delhi: India Information and Broadcasting India.
Chicago
India Information And Broadcasting (M/O-), India Information And Broadcasting (M/O-), . 1974. "Fourth five year plan, 1969-74". Delhi: India Information and Broadcasting India.
Harvard
India Information And Broadcasting (M/O-), India Information And Broadcasting (M/O-), . (1974). "Fourth five year plan, 1969-74". Delhi: India Information and Broadcasting India.
MLA
India Information And Broadcasting (M/O-), India Information And Broadcasting (M/O-), . "Fourth five year plan, 1969-74". Delhi: India Information and Broadcasting India. 1974.
