Item type | Current library | Collection | Call number | Copy number | Status | Notes | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 3 | Not For Loan | 045500 | 045500 | |||
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 4 | Not For Loan | 045501 | 045501 | |||
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 5 | Available | 045502 | 045502 | |||
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 6 | Available | 056454 | 056454 | |||
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 7 | Available | 056455 | 056455 | |||
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 8 | Available | 056456 | 056456 | |||
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 9 | Available | 056457 | 056457 | |||
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 10 | Available | 057769 | 057769 | |||
![]() |
CENTRAL LIBRARY | 005.82 BUC/I (Browse shelf(Opens below)) | 11 | Available | 057770 | 057770 | |||
![]() |
COMPUTER SCIENCE LIBRARY | COMPUTERSC | 005.82 BUC/I (Browse shelf(Opens below)) | 1 | Available | 045498 | 045498 | ||
![]() |
COMPUTER SCIENCE LIBRARY | COMPUTERSC | 005.82 BUC/I (Browse shelf(Opens below)) | 2 | Available | 045499 | 045499 | ||
![]() |
COMPUTER SCIENCE LIBRARY | INFORMATIO | 005.82 BUC/I (Browse shelf(Opens below)) | 12 | Available | 057771 | 057771 | ||
![]() |
COMPUTER SCIENCE LIBRARY | INFORMATIO | 005.82 BUC/I (Browse shelf(Opens below)) | 13 | Available | 057772 | 057772 |
Browsing COMPUTER SCIENCE LIBRARY shelves, Shelving location: COMPUTER SCIENCES & APPLICATION LIBRARY Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
No cover image available |
![]() |
||
005.8 WEI/A Auditing IT Infrastructures for Compliance | 005.8 WHI/P Principles of Information Security | 005.82 BIS/I Introduction to Cryptography with Java Applets | 005.82 BUC/I Introduction to Cryptography | 005.82 BUC/I Introduction to Cryptography | 005.82 BUR/R RSA Security's Officila Guide to Cryptography | 005.82 CRY Cryptography and Network Security |
index included
There are no comments on this title.
Log in to your account to post a comment.