Cryptography and network security:principles and practice William Stallings
Material type: TextPublication details: Noida Pearson 2017Edition: 7/eDescription: 766 ill. 23cmISBN:- 9789332585225
- 004.056 STA
Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004349 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004350 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004351 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004352 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004353 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004354 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004355 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004356 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004357 | |
Books | IIITDM Kurnool General Stacks | Non-fiction | 004.056 STA (Browse shelf(Opens below)) | Available | 0004358 | |
Books | IIITDM Kurnool General Stacks | 004.056 STA (Browse shelf(Opens below)) | Available | 0001297 | ||
Books | IIITDM Kurnool General Stacks | 004.056 STA (Browse shelf(Opens below)) | Available | 0001298 | ||
Reference | IIITDM Kurnool Reference | Reference | 004.056 STA (Browse shelf(Opens below)) | Not for loan | 0001299 |
Browsing IIITDM Kurnool shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
Symmetric ciphers Asymmetric ciphers Cryptographic data integrity algorithms Mutual trust Network and internet security
This text provides a practical survey of both the principles and practice of cryptography and network security
There are no comments on this title.