Kulliyat nazmiyat-e-Akif
By: Material type:
TextLanguage: Urdu Publication details: Delhi Kitabi duniya India 2016Description: 208p. cmISBN: - 9789384269499 (hbk)
- O168,1(Y11)x, Q6
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Central Library | Central Library | O168,1(Y11)x Q6 (Browse shelf(Opens below)) | Available | CL1639076 |
There are no comments on this title.
Log in to your account to post a comment.
-
201
Cryptography research perspectives
by Chen Roland E Ed. -
202
Cryptography, information theory and error-correction: A handbook for the 21st century
by Bruen Aiden A -
203
Current security management and ethical issues of information technology
by Azari Rasool Ed. -
204
Cyber Attacks: Protecting national infrastructure
by Amoroso Edward G -
205
Cyber crime security and digital intelligence
by Johnson Mark -
206
Cyber power : crime conflict and security in cyberspace
by Ghermaouti Solange -
207
Cyber security : understanding cyber crimes, computers forensics and lagal perspectives
by Godbole Nina; Belapure Sunit -
208
Cyber security : understanding cyber crimes, computers forensics and lagal perspectives
by Godbole Nina; Belapure Sunit -
209
Cyber Security and Computer Science
by Touhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali -
210
Cyber security essentials
by Graham James; Howard Richard; Olson Ryan -
211
Cyber security for industrial control systems from the viewpoint of close-loop
by Cheng Peng Ed. -
212
Cyber Security Practitioner'S Guide
by Jahankhani Hamid -
213
Cyber security: Economic strategies and public policy alternatives
by Gallaher Michael P -
214
Cyber-Physical security: Protecting critical infrastructure at the state and local level
by Clerk Robert M Ed. -
215
Cybercrime and espionage: An analysis of subversive multivector threats
by Will Gragido; Pirc John -
216
Cybersecurity essentials
by Brooks Charles J -
217
Cyberspace and cyber security
by Kostopoulos George K -
218
Data communications and networking
by Forouzan, Behrouz A -
219
Data hiding fundamentals and applications: Content security in digital multimedia
by Sencar Husrev T -
220
Data protection:governance, risk management, and compliance
by Hill David G -
221
Data Science for Cyber-Security
by Adams Niall Et Al -
222
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
223
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
224
Data-driven block ciphers for fast telecommunication systems
by Moldovyan Nikolay A -
225
Database security
by Castano Silvana^eand REFs -
226
Database security and integrity
by Fernandez Eduardo B -
227
Database systems
by Singh S K -
228
Datbase security and auditing
by Afyouni Hassan A -
229
Datbase security and auditing
by Afyouni Hassan A -
230
Decrypted secrets: methods and maxims of cryptology
by Bauer Friedrich L -
231
Decrypted secrets: methods and maxims of cryptology
by Bauer Friedrich L -
232
Decrypted secrets: methods and maxims of cryptology
by Bauer Friedrich L -
233
Design of rijndael : AES-the advanced encryption standard
by Daemen Joan -
234
Designing of authentication and message security schemes in wireless sensor networks Deepti Singh
by Singh Deepti Au. -
235
Designing privacy enhancing technologies
by Federrath Hannes Ed. -
236
Designing security architecture solutions by Jay Ramachandran
by Ramachandran Jay -
237
Developing and securing the cloud
by Thuraisingham Bhavani -
238
Developing secure distributed systems with CORBA
by Lang Ulrich -
239
Digital defense :what you should know about protecting your company's assets
by Parenty Thomas J -
240
Digital identitiy management:perspectives on the technological, business and social implications
by Birch David G W Ed. -
241
Digital rights management for e-commerce systems
by Tsolis Dimitrios -
242
Digital signature
by Gupta Kailash N -
243
Digital signature
by Gupta Kailash N -
244
Digital signature
by Gupta Kailash N -
245
Digital signature: Network security practices
by Gupta Kailash N -
246
Digital watermarking and steganography
by Cox Ingemar J -
247
Digital watermarking and steganography: Fundamentals and techniques
by Shih Frank Y -
248
Disaster survival guide for business communications networks
by Grigonis Richard -
249
Distributed Database management: A practical approach
by Rahimi Saeed, K; Haug Frank, S -
250
Distributed systems security:issues, processes and solutions
by Belapukar Abhijit
Kulliyat nazmiyat-e-Akif
APA
Akif Raz-ur-Rahman Au, . (2016). Kulliyat nazmiyat-e-Akif. Delhi: Kitabi duniya India.
Chicago
Akif Raz-ur-Rahman Au, . 2016. Kulliyat nazmiyat-e-Akif. Delhi: Kitabi duniya India.
Harvard
Akif Raz-ur-Rahman Au, . (2016). Kulliyat nazmiyat-e-Akif. Delhi: Kitabi duniya India.
MLA
Akif Raz-ur-Rahman Au, . Kulliyat nazmiyat-e-Akif. Delhi: Kitabi duniya India. 2016.
