Cyber crime and corporate liability
By: Material type:
TextLanguage: English Publication details: New Delhi Wolters Kluwer 2008Description: 520p cmDDC classification: - XM8:8:(D6,8(B)), P8
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
South Campus Library | South Campus Library | XM8:8:(D6,8(B)) P8 (Browse shelf(Opens below)) | Available | SC1307025 |
There are no comments on this title.
Log in to your account to post a comment.
-
1
Unix network programming
by Stevens W Richard -
2
Unix network programming
by Stevens W Richard -
3
Unix network programming
by Stevens W Richard -
4
Unix network programming
by Stevens W Richard -
5
Unix network programming
by Stevens W Richard -
6
Unix network programming
by Stevens W Richard -
7
Unix network programming
by Stevens W Richard -
8
Unix network programming
by Stevens W Richard -
9
Unix network programming
by Stevens W Richard -
10
Unix network programming
by Stevens W Richard -
11
Unix network programming
by Stevens W Richard -
12
Unix network programming
by Stevens W Richard -
13
Unix network programming
by Stevens W Richerd -
14
Unix network programming
by Stevens W Richerd -
15
Unix network programming
by Stevens W Richerd -
16
Unix network programming
by Stevens W Richerd -
17
Unix network programming
by Stevens W Richerd -
18
Unix network programming
by Stevens W Richard; Fenner Bill; Rudoff Andrew M -
19
Unix network programming
by Stevens W Richard; Fenner Bill; Rudoff Andrew M -
20
Unix network programming
by Stevens W Richard; Fenner Bill; Rudoff Andrew M -
21
Unix network programming
by Stevens W Richard; Fenner Bill; Rudoff Andrew M -
22
Unix network programming
by Stevens W Richard; Fenner Bill; Rudoff Andrew M -
23
Unix network programming
by Stevens W Richard; Fenner Bill; Rudoff Andrew M -
24
Unix network programming
by Stevens WR -
25
Unix network programming
by Stevens W R -
26
UNIX network programming
by Stevens W Richard -
27
UNIX network programming
by Stevens W Richard -
28
UNIX network programming
by Stevens W Richard -
29
UNIX network programming
by Stevens W Richard -
30
UNIX network programming
by Stevens W Richard -
31
UNIX network programming
by Stevens W Richard -
32
UNIX network programming
by Stevens W Richard -
33
UNIX network programming
by Stevens W Richard -
34
UNIX network programming
by Stevens W Richard -
35
UNIX network programming
by Stevens W Richard -
36
UNIX network programming
by Stevens W Richard -
37
UNIX network programming
by Stevens W Richard -
38
UNIX network programming
by Stevens, W. Richard -
39
UNIX Network programming
by Stevens W R -
40
Unix network programming
by Stevens W Richard -
41
Unix network programming
by Stevens W Richard -
42
Unix network programming
by Stevens W Richard -
43
Unix network programming
by Stevens W Richard -
44
Unix network programming
by Stevens Richard -
45
Unix network programming
by Stevens Richard -
46
Unix network programming
by Stevens Richard -
47
Unix network programming
by Stevens Richard -
48
Unix network programming
by Stevens W Richard -
49
Unix network programming
by Stevens W Richard -
50
Unix network programming
by Stevens
Cyber crime and corporate liability
APA
Nagpal Rohas, . (2008). Cyber crime and corporate liability. New Delhi: Wolters Kluwer.
Chicago
Nagpal Rohas, . 2008. Cyber crime and corporate liability. New Delhi: Wolters Kluwer.
Harvard
Nagpal Rohas, . (2008). Cyber crime and corporate liability. New Delhi: Wolters Kluwer.
MLA
Nagpal Rohas, . Cyber crime and corporate liability. New Delhi: Wolters Kluwer. 2008.
