Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | Kuvempu University Library | 005.82 KAH (Browse shelf) | Available | 117135 | |
Books | Kuvempu University Library | 005.82 KAH;1 (Browse shelf) | Available | 117136 | |
Books | Kuvempu University Library | 005.82 KAH;2 (Browse shelf) | Available | 117137 | |
Books | Kuvempu University Library | 005.82 KAH;3 (Browse shelf) | Available | 117138 | |
Books | Kuvempu University Library | 005.82 KAH;4 (Browse shelf) | Available | 119374 |
005.82 KAH;1 Cryptography and network security / | 005.82 KAH;2 Cryptography and network security / | 005.82 KAH;3 Cryptography and network security / | 005.82 KAH;4 Cryptography and network security / | 005.82 KEN Cryptography in the database:the last line of defense / | 005.82 SCH Applied cryptogrophy: protocols,algorithms and source code in C / | 005.82 SCH;1 Applied cryptogrophy: protocols,algorithms and source code in C / |
Powered by Koha
There are no comments for this item.