000 | nam a22 7a 4500 | ||
---|---|---|---|
999 |
_c71669 _d71669 |
||
003 | FUTML | ||
005 | 20230828172508.0 | ||
007 | ta | ||
008 | 230828r a|||gr|||| 001 0 eng d | ||
020 | _a9781633215658 (hardcover) | ||
020 | _a9789395691697 | ||
037 | _aB-46988 | ||
040 |
_aFUTML _beng _cFUTML _eFUTML _dFUTML |
||
050 | 0 | 0 |
_aTK5105.59 _b.S52 2023 |
100 | 1 |
_aSharma, Er.L _d1951- _935686 |
|
245 | 1 | 0 |
_aCyber-risk informatics : _bEngineering, Evaluation, with Data Science/ _cBy Er. Lata Sharma.- _hPrint. |
264 | 1 |
_aNew Delhi: _bPinakin Publishing, _cC 2023. |
|
300 |
_ax,253p.: _bill.; _c24cm. |
||
490 | 0 | _aCryptography, steganography, and data security | |
504 | _aIncludes bibliography and index. | ||
590 | _aB-46988/JIYA/28/08/2023 | ||
650 | 0 |
_aComputer networks _96463 |
|
650 | 0 |
_aComputer networks _xReliability. _935687 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _96366 |
|
912 |
_aJIYA _bJIYA _cDr SABA |
||
942 |
_2lcc _cBKS |
||
949 |
_aIBBL GK _cTK5105.59 _d.S52 2023 _g2342147838 _nNC 1 |