Publisher
Edition
At
0
Contourlet transformation for data hiding /
Near East University,
2014
QA76.575 .Z44 2014
NEU Grand Library[Reserve Section] (2)
Available
0
Cryptonomicon /
ISBN: 0060512806
Avon Press,
2002.
PS3567.U57 .S74 2002
NEU Grand Library[American Corner]
Available
11
Cryptography and network security :
principles and practice /
ISBN: 0131873164
Pearson/Prentice Hall,
c2006.
TK5105.59 .S73 2006
NEU Grand Library[General Collection] (3)
Available
1
Cryptography and network security :
principles and practice /
ISBN: 013705632X
Prentice Hall,
2011.
TK5105.59 .S713 2011
NEU Grand Library[General Collection]
Available
0
Cryptography and network security :
principles and practice /
ISBN: 0131115022
Prentice Hall,
2003.
TK5105.59 .S713 2003
NEU Grand Library[General Collection]
Available
0
Encryption & Message Security Of GSM /
Near East University,
2001.
TK5103.483 .R44 2001
NEU Grand Library[Reserve Section]
Available
0
Embedded cryptographic hardware :
methodologies and architectures /
ISBN: 1594540128
Nova Science Publishers,
c2004.
TK5102.94 .E49 2004
NEU Grand Library[General Collection]
Available
0
Cryptography and security over network using data encryption standard /
Near East University,
2003.
QA76.9.A25 .M47 2003
NEU Grand Library[Reserve Section]
Available
1
Writing secure code :
practical strategies and proven techniques for building secure applications in a networked world /
ISBN: 0735617228
Microsoft Press,
2003.
QA76.9.A25 H698 2003
NEU Grand Library[General Collection]
Available
0
Writing secure code /
ISBN: 0735617228
Microsoft Press,
c2003.
QA76.9.A25 H698 2003
University of Kyrenia Grand Library[General Collection]
Available