Cyber laws and IT protection
Material type: TextPublication details: PHI, New Delhi: ©2012Description: xx, 267pISBN:- 9788120345706
- CHA 005.8
Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Reference Books | GCET LIBRARY B.Tech (IT) | Information Technology | 005.8 CHA (Browse shelf(Opens below)) | Not for loan | 054043 | |
Books | GCET LIBRARY B.Tech (IT) | Information Technology | 005.8 CHA (Browse shelf(Opens below)) | Available | 054044 | |
Books | GCET LIBRARY B.Tech (IT) | Information Technology | 005.8 CHA (Browse shelf(Opens below)) | Available | 054045 | |
Books | GCET LIBRARY B.Tech (IT) | Information Technology | 005.8 CHA (Browse shelf(Opens below)) | Available | 054046 | |
Books | GCET LIBRARY MCA | Information Technology | 005.8 CHA (Browse shelf(Opens below)) | Available | 054047 | |
Books | GCET LIBRARY MCA | Information Technology | 005.8 CHA (Browse shelf(Opens below)) | Available | 054048 | |
Books | GCET LIBRARY MCA | Information Technology | 005.8 CHA (Browse shelf(Opens below)) | Available | 054049 | |
Books | GCET LIBRARY MCA | Information Technology | 005.8 CHA (Browse shelf(Opens below)) | Available | 054050 | |
Books | GCET LIBRARY MCA | Computer Science Engineering | 005.8 CHA (Browse shelf(Opens below)) | Available | 054051 | |
Books | GCET LIBRARY B.Tech (IT) | Computer Science Engineering | 005.8 CHA (Browse shelf(Opens below)) | Available | 054052 | |
Books | GCET LIBRARY B.Tech (IT) | Computer Science Engineering | 005.8 CHA (Browse shelf(Opens below)) | Available | 054053 | |
Books | GCET LIBRARY B.Tech (CSE) | Computer Science Engineering | 005.8 CHA (Browse shelf(Opens below)) | Available | 054054 | |
Books | GCET LIBRARY B.Tech (CSE) | Computer Science Engineering | 005.8 CHA (Browse shelf(Opens below)) | Available | 054055 |
Browsing GCET LIBRARY shelves, Shelving location: B.Tech (IT), Collection: Computer Science Engineering Close shelf browser (Hides shelf browser)
005.8 BUR Security power tools | 005.8 BUR Security power tools | 005.8 CHA Cyber laws and IT protection | 005.8 CHA Cyber laws and IT protection | 005.8 PAN Cyber security | 005.8 STE Certified information systems security profeesional: Study guide | 005.8 TRI Introduction to information security and cyber laws |
There are no comments on this title.