Information Theory Coding and Cryptography
Material type:
Item type | Current library | Home library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
CENTRAL LIBRARY, NOORUL ISLAM CENTRE FOR HIGHER EDUCATION | CENTRAL LIBRARY, NOORUL ISLAM CENTRE FOR HIGHER EDUCATION | 005.82 P2 (Browse shelf(Opens below)) | Available | 17867 |
Browsing CENTRAL LIBRARY, NOORUL ISLAM CENTRE FOR HIGHER EDUCATION shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
No cover image available |
![]() |
![]() |
![]() |
||
005.8 Q3 An Unofficial Guide to Ethical Hacking | 005.8 Q3 Applied Cyber Security and the Smart Grid | 005.82 P1 "Applied Cryptography : Protocols,Algorithms and Source Code in C" | 005.82 P2 Information Theory Coding and Cryptography | 005.82 P3 Practical Cryptography : | 005.82 P6 Information Coding Techniques | 005.82 Q0 Information Coding Techniques |
TRANSFERED
There are no comments on this title.
Log in to your account to post a comment.