Stop worrying about backache
By: Material type:
TextLanguage: English Publication details: Bombay Popular Prakashan 1983Description: 102p cmSubject(s): DDC classification: - L73:4:6, M3
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Central Library | Central Library | L73:4:6 M3 (Browse shelf(Opens below)) | Available | CL0888328 |
There are no comments on this title.
Log in to your account to post a comment.
-
51
Cryptography and network security: Principles and practice
by Stallings William -
52
Cryptography and network security: Principles and practice
by Stallings William -
53
Cryptography and network security: Principles and practice
by Stallings William -
54
Cryptography and network security: Principles and practice
by Stallings William -
55
Cryptography and network security: Principles and practice
by Stallings William -
56
Cryptography and network security: Principles and practice
by Stallings William -
57
Cryptography and network security: Principles and practice
by Stallings William -
58
Cryptography and network security: Principles and practice
by Stallings William -
59
Cryptography and network security: Principles and practice
by Stallings William -
60
Cryptography and network security: Principles and practice
by Stallings William -
61
Cryptography and network security: Principles and practice
by Stallings William -
62
Cryptography and network security: Principles and practice
by Stallings William -
63
Cryptography and network security: Principles and practice
by Stallings William -
64
Cryptography and network security: Principles and practice
by Stallings William -
65
Cryptography and network security: Principles and practice
by Stallings William -
66
Cryptography and network security: Principles and practice
by Stallings William -
67
Cryptography and network security: Principles and practice
by Stallings William -
68
Cryptography and network security: Principles and practice
by Stallings William -
69
Cryptography and network security: Principles and practice
by Stallings William -
70
Cryptography and network security: Principles and practice
by Stallings William -
71
Cryptography and network security: Principles and practice
by Stallings William -
72
Cryptography and network security: Principles and practice
by Stallings William -
73
Cryptography and networks security
by Kahate Atul -
74
Cryptography and security
by Shyamala C K; Harini N; Padmanabhan T R -
75
Cryptography and security
by Shyamala C K; Harini N; Padmanabhan T R -
76
Cyber security essentials
by Graham James; Howard Richard; Olson Ryan -
77
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
78
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
79
Digital signature
by Gupta Kailash N -
80
Digital signature
by Gupta Kailash N -
81
Digital signature
by Gupta Kailash N -
82
Digital signature: Network security practices
by Gupta Kailash N -
83
Disaster survival guide for business communications networks
by Grigonis Richard -
84
Elements of computer security
by Salomon David -
85
Energy-efficient wireless sensor networks
by Sharma Vidushi Ed. -
86
Engineering Information Security
by Jacobs, Stuart -
87
Evaluating indirect and direct classification techniques for network intrusion detection
by Ibrahim Nawal H -
88
Firewall design and analysis
by Liu Alex X -
89
Framework for network intelligence and security
by El-Semary Aly Mohamed -
90
Fundamentals of network security
by Maiwald Eric -
91
Fundamentals of network security
by Maiwald Eric -
92
Guide to computer network security
by Kizza Joseph Migga -
93
Guide to computer network security
by Kizza Joseph Migga -
94
Guide to wireless network security
by Vacca John R -
95
Handbook of electronic security and digital forensics
by Jahankhani Hamid Ed. -
96
Handbook on securing cyber-physical critical infrastructure : foundations and challenges
by Das Sajal K; Kant Krishna; Zhang Nan -
97
Information system security : security management, metrics, frameworks and best practices
by Godbole Nina -
98
Information system security : security management, metrics, frameworks and best practices
by Godbole Nina -
99
Inside network perimeter security
by Northcutt Stephen -
100
Inside network perimeter security
by Northcutt Stephen
Stop worrying about backache
APA
Ramani P S, . (1983). Stop worrying about backache. Bombay: Popular Prakashan.
Chicago
Ramani P S, . 1983. Stop worrying about backache. Bombay: Popular Prakashan.
Harvard
Ramani P S, . (1983). Stop worrying about backache. Bombay: Popular Prakashan.
MLA
Ramani P S, . Stop worrying about backache. Bombay: Popular Prakashan. 1983.
