UITU Library & LRC     Book GIFs | Tenor

Your search returned 5601 results.

Sort
Results
Network Security: private communication in a public world

by Kaufman, Charlie.

Edition: 2ndMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2013Availability: Items available for loan: UITU (1)Call number: 5.8.

Principles of Information Security

by Whitman ,Michael E.

Edition: 4thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2012Availability: Items available for loan: UITU (1)Call number: 5.8.

Cryptography and Network Security

by Forouzan, Behrouz A.

Edition: 2ndMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: .NAAvailability: Items available for loan: UITU (1)Call number: 005.8 FOR.

Cryptography and Network Security:principles and pratice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

C++ Programs to Accompany Programing Logic and Design

by Smith, Jo Ann.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2010Availability: Items available for loan: UITU (1)Call number: 5.133.

Design and Analysis of Alogrithms

by Dave, Parag H.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.1 DAV.

Operating System

by Deitel ,Harvey M.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2013Availability: Items available for loan: UITU (1)Call number: 005.43 DEI.

Cloud Computing : theory and practice

by Marinescu, Dan C.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2013Availability: Not available: UITU: Checked out (1).

Cloud Computing

by Miller , Michael.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2008Availability: Items available for loan: UITU (1)Call number: 004.6782 MIL.

Introduction to Soft Computing: neuro-fuzzy and genetic algorithms

by Roy , Samir.

Edition: 1stMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2013Availability: Items available for loan: UITU (1)Call number: 006.3 ROY.

Simple Program Design: a java approch

by Overton, James.

Edition: 1stMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2007Availability: Items available for loan: UITU (1)Call number: 005.12 OVE.

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Not available: UITU: Checked out (1).

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Cryptography and Network Security: principles and practice

by Stallings, William.

Edition: 6thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Pages