Threat modeling designing for secruity
Material type: Text 2014Description: Soft Binding xxxii 590ISBN:- 978-81-265-4865-1
- 006.8 SHO-T
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
Books | COMSATS University Lahore Campus | 006.8 SHO-T (Browse shelf(Opens below)) | 1 | Available | LHR 28402 |
Total holds: 0
Browsing COMSATS University Lahore Campus shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | ||||||
006.786 GYN-A Adobe After Effects CC 2018 release Classroom in a book The official training workbook from adobe | 006.7876 TOP-S Streaming Media Demystified | 006.8 SHO-T Threat modeling Designing foe security | 006.8 SHO-T Threat modeling designing for secruity | 006.822 SMI-V VHDL For Programmable Logic | 008.5 BIS-I Introduction to computer security | 008.5 BIS-I Introduction to computer security |
English
There are no comments on this title.