Ldr
00025nam a2200024 a 4500
100
##
$aStallings, William
245
00
$aCryptography and network security :$bprinciples and practice /$cWilliam Stallings; Mohit P. Tahiliani
260
##
$aHarlow, England :$bPearson,$c2014
300
##
$a751 pages :$billustrations ;$c24 cm
653
##
$aComputer networks
653
##
$aComputer science
653
##
$aSecurity measures
700
##
$aTahiliani, Mohit P.
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001080
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001081
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001083
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001084
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001085
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001086
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001087
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001088
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001089
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001090
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001091
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001092
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001093
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001094
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001095
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001096
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001097
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001099
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001100
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001101
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001102
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001103
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001104
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001105
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001106
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001107
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001108
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001109
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001110
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001111
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001112
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001113
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001114
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001115
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001116
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001117
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001118
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001119
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001120
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001121
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001122
852
$aFPTU HN$bGT/TTHL$jGT/TTHL001907