The story of burnt njal
By: Material type:
TextLanguage: English Publication details: London J. M. Dent & Sons Ltd. UK 1911Description: 330p. cmDDC classification: - O-,3M17,4, 111E1
Textbook
No physical items for this record
There are no comments on this title.
Log in to your account to post a comment.
-
1
Case studies in secure computing
-
2
Data communications and networking
by Forouzan, Behrouz A -
3
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
4
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
5
Digital watermarking and steganography: Fundamentals and techniques
by Shih Frank Y -
6
Emerging security algorithms and techniques
by Ahmad Khaleel Ed. -
7
Enhancing cryptographic pimitives with techniques from error correcting codes
by Preneel Bart Ed. -
8
Evaluating indirect and direct classification techniques for network intrusion detection
by Ibrahim Nawal H -
9
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
by Dube Roger -
10
Intelligence and security informatics:techniques and applications
by Chen Hsinchun Ed. -
11
Multimedia security: steganography and digital watermarking techniques for protection of intellectual property
by Lu Chun-Shien -
12
Operating systems : Integrals and design principles
by Stalling Williams -
13
Operating systems : Integrals and design principles
by Stalling Williams -
14
Operating systems : Integrals and design principles
by Stalling Williams -
15
Practical Data Mining
by Hancock, Monte F. -
16
REID security:techniques, protocols and system-on-chip design
by Kitsos Paris Ed. -
17
Security Enhancement Techniques for efficient routing in opportunistic internet of things
by Kandhoul Nisha Au. -
18
Soft computing techniques for intrusion detection
by Gomez Jonatan -
19
Statistical Pattern Recognition
by Webb, Andrew R. -
20
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
by Lin Hua -
21
Techniques for enhancing the security of android framework
by Verma Sushma Au. -
22
Techniques for security in grid computing
by Bhatia Manjot Kaur Au. -
23
Wireless security and privacy: best practices and design techniques
by Swaminatha Tara M
The story of burnt njal
APA
Dasent George Webbe, . (1911). The story of burnt njal. London: J. M. Dent & Sons Ltd. UK.
Chicago
Dasent George Webbe, . 1911. The story of burnt njal. London: J. M. Dent & Sons Ltd. UK.
Harvard
Dasent George Webbe, . (1911). The story of burnt njal. London: J. M. Dent & Sons Ltd. UK.
MLA
Dasent George Webbe, . The story of burnt njal. London: J. M. Dent & Sons Ltd. UK. 1911.
