Building a secure computer system
By: Material type:
TextLanguage: English Publication details: New York Van Nostrand Reinhold Co. 1988Description: 288p. cmSubject(s): DDC classification: - D65,8(B), M8
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Central Science Library | Central Science Library | D65,8(B) M8 (Browse shelf(Opens below)) | Available | SL0957666 |
There are no comments on this title.
Log in to your account to post a comment.
-
1
3 D object processing compression, indexing, and watermarking
by Dugelay Jean-Luc Ed. -
2
360 Degree Brand in Asia: creating more effective marketing communications
by Blair M -
3
Agile modeling: effective practices for extreme programming and the unified process
by Ambler Scott W -
4
American social welfare Insitution
by Smith, R.E. -
5
American world literature
by Giles Paul Au. -
6
Analysis Of Economic Data
by Koop G -
7
Analysis of genes and genomes
by Reece Richard J -
8
Analytical instrumentation performance characteristics and quality by Graham Currell
by Currell Graham -
9
Angels, mobsters and narco-terrorists: the rising menace of global criminal empires
by Nicaso Antonio -
10
Anxiety and educational achievement
by Gaudry Eric -
11
Applied bayesian modelling
by Congdon Peter -
12
Basic elements of narrative
by Herman David -
13
Bayesian methods for nonlinear classification and regression
by Denison David G T -
14
Bayesian models for categorical data
by Congdon Peter -
15
Bayesian networks and probabilistic inference in forensic science
by Taroni Franco -
16
Beyond environmentalism
by Foss J. E. -
17
Bioethics
by Kuhse Helga Ed. -
18
Biometrics: identity verification in a networked world
by Nanavati Samir^eand REFs -
19
Canadian family law
by Kronby Malcolm C. -
20
Chemical analysis: Modern instrumentation methods and techniques
by Rouessac Francis -
21
Chemical biology :applications and techniques
by Larijani Banafshe -
22
Chemical biology :applications and techniques
by Larijani Banafshe -
23
Chemistry in alternative reaction media
by Adams Dave J -
24
Citizen brands: Putting society at the heart of your business
by Willmott M -
25
Classic algebra
by Cohn P M -
26
Classic algebra
by Cohn P M -
27
Classic algebra
by Cohn P M -
28
Classic algebra
by Cohn P M -
29
Classic algebra
by Cohn P M -
30
Classic Algebra.
by Cohn P.M -
31
Classical mechanics : From Newton to Einstein : a modern introduction
by Martin W McCall -
32
Classical sociological theory
by Calhoun Craig -
33
Climate and hydrology in mountain areas
by DeJong Carmen and others Ed. -
34
Climate and hydrology in mountain areas
by DeJong Carmen and others Ed. -
35
Clinical and educational child psychology
by Wilmshurst Linda -
36
Coal geology
by Thomas Larry -
37
Coding theory: algorithms, architectures and applications
by Neubauer Andre -
38
Cognitive analytic therapy and borderline personality disorder
by Ryle Anthony -
39
Colloids and interfaces with surfactants and polymers: an introduction
by Goodwin Jim W -
40
Combinatorial strategies in biology and chemistry
by Beck-Sickinger Annette -
41
Communication systems by Simon Haykin
by Haykin Simon -
42
Communication systems by Simon Haykin
by Haykin Simon -
43
Communication systems by Simon Haykin
by Haykin Simon -
44
Communication systems by Simon Haykin
by Haykin Simon -
45
Communication systems by Simon Haykin
by Haykin Simon -
46
Companion to Aristotle
by Anagnostopoulos Georgios Ed. -
47
Companion to modernist poetry
by Chinitz David E Ed. -
48
Companion to renaissance poetry
by Bates Catherine Ed. -
49
Comparative utbanism: Tactics for global urban studies
by Robinson Jennifer -
50
Comparison methods for stochastic models and risks
by Muller Alferd
Building a secure computer system
APA
Gasser Morrie, . (1988). Building a secure computer system. New York: Van Nostrand Reinhold Co.
Chicago
Gasser Morrie, . 1988. Building a secure computer system. New York: Van Nostrand Reinhold Co.
Harvard
Gasser Morrie, . (1988). Building a secure computer system. New York: Van Nostrand Reinhold Co.
MLA
Gasser Morrie, . Building a secure computer system. New York: Van Nostrand Reinhold Co. 1988.
