ਚੰਨ ਤਾਰੇ
By: Material type:
TextLanguage: Pun Publication details: 1957Subject(s): DDC classification: - O153,3M95x, J7
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Arts Library | Arts Library | O153,3M95x J7 (Browse shelf(Opens below)) | Available | ALE001491 |
There are no comments on this title.
Log in to your account to post a comment.
-
7801
Securing IRIS biometric system against replay and database attacks using conventional and deep learning approaches
by Gupta Richa Au. -
7802
Securing Social Media in the Enterprise
by Dalziel, Henry -
7803
Securing SQL Server
by Cherry, Denny -
7804
Securing the Internet of Things
by Li, Shancang -
7805
Securing VOIP
by (Bud) Bates, Regis J. -
7806
Security and cooperation in wireless networks:thwarting malicious and selfish behavior in the age of ubiquitous computing
by Buttyan Levente -
7807
Security and privacy for big data, cloud computing and applications
by Ren Wei Ed. -
7808
Security and Privacy in Cyber - Physical Systems - Foundations, Principles and Applications
-
7809
Security and quality of service in Ad Hoc wireless networks
by Mishra Amitabh -
7810
Security complete
by Security complete -
7811
Security Controls Evaluation, Testing and Assessment Handbook
by Johnson, Leighton -
7812
Security for computer networks
by Davies D W -
7813
Security for computer networks
by Davies D W -
7814
Security for mobility
by Mitchell Chris J Ed. -
7815
Security for service oriented architectures
by Williams Walter -
7816
Security for software engineers
by Helfrich James M -
7817
Security for telecommunications networks
by Traynor Patrick -
7818
Security for wireless sensor networks
by Liu Donggang -
7819
Security for wireless sensor networks using Identiy-Based Cryptography
by Patil Harsh Kupwade; Szygenda Stephen A -
7820
Security in Ad Hoc and sensor networks
by Beyah Raheem -
7821
Security in Ad-Hoc and Sensor Networks
by Beyah Raheem Et Al -
7822
Security in an IPv6 environment
by Minoli Daniel -
7823
Security in computing
by Pfleeger Charles P -
7824
Security in computing
by Pfleeger Charles P -
7825
Security in computing
by Pfleeger Charles P; Pfleeger Shari Lawrence; Shah Deven N -
7826
Security in computing
by Pfleeger Charles P; Pfleeger Shari Lawrence; Shah Deven N -
7827
Security in computing
by Pfleeger Charles P; Pfleeger Shari Lawrence; Shah Deven N -
7828
Security in computing systems:challenges, approaches and solutions
by Biskup Joachim -
7829
Security in Distributed and Networking Systems
by Xiao Yang Et Al -
7830
Security in wireless mesh networks
by Zhang Yan Ed. -
7831
Security Modeling and Analysis of Mobile Agent Systems
by Lu Ma & Tsai Jeffery J P -
7832
Security of e-systems and computer networks
by Obaidat Mohammad S -
7833
Security of information and communication networks
by Kartalopoulos Stamatios V -
7834
Security policies and implementation issues
by Rob Johnson -
7835
Security risk assessment handbook: A complete guide for performing security risk assessments
by Landoll Douglas J -
7836
Security Risks in Social Media Technologies
by Oxley, Alan -
7837
Security software development: Assessing and managing security risks
by Ashbaugh Douglas A -
7838
Security strategies in window platforms and applications
by Solomon Michael G -
7839
Security strategy from requirements to reality
by Stackpole Bill -
7840
Security technologies for the world wide web
by Oppliger Rolf -
7841
Security, accuracy and privacy in computer systems
by Martin James -
7842
Security: A critical introduction
by Jarvis Lee -
7843
Selected styles in web-based educational research
by Mann Bruce L Ed. -
7844
Selected Topics in Communication Networks and Distributed Systems
by Misra Sudip Et Al -
7845
Selected Topics in Information and Coding Theory
by Woungang Isaac Et Al -
7846
Selected writings on computing: A personal perspective
by Dijkstra Edsger W -
7847
Selected writings on computing: A personal perspective
by Dijkstra Edsger W -
7848
Selection of image processing techniques: From fundamentals to research front
by Zhang, Yu-Jin -
7849
Self organization in sensor and actor networks
by Dressler Falko -
7850
Self-adaptive software
by Robertson Paul Ed
ਚੰਨ ਤਾਰੇ
APA
ਸਿੰਘ ਗ., . (1957). ਚੰਨ ਤਾਰੇ. : .
Chicago
ਸਿੰਘ ਗੁਰਬ॥F, . 1957. ਚੰਨ ਤਾਰੇ. : .
Harvard
ਸਿੰਘ ਗ., . (1957). ਚੰਨ ਤਾਰੇ. : .
MLA
ਸਿੰਘ ਗੁਰਬ॥F, . ਚੰਨ ਤਾਰੇ. : . 1957.
