|
1.
|
|
|
2.
|
Information systems security Fisher, Royal P. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Englewood Cliffs, N.J. Prentice-Hall 1984
Availability: Items available for loan: Ahmedabad (1)Call number: 658.4 F4I6.
|
|
3.
|
|
|
4.
|
|
|
5.
|
Computer security management Parker, Donn B. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Reston Va. Reston, Publishing Company, Inc. 1981
Availability: Items available for loan: Ahmedabad (1)Call number: 658.28 P2C6.
|
|
6.
|
|
|
7.
|
|
|
8.
|
|
|
9.
|
|
|
10.
|
|
|
11.
|
Computer insecurity Adrian R.D. Norman by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London Chapman and Hall 1983
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 N6C6.
|
|
12.
|
|
|
13.
|
Audit and control of systems software by
Material type: Text; Literary form:
Not fiction
Publication details: Manchester NCC Publications 1983
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 N2A8.
|
|
14.
|
Introducing computer security Michael B. Wood by
Material type: Text; Literary form:
Not fiction
Publication details: Manchester NCC Publications 1982
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 W6I6.
|
|
15.
|
|
|
16.
|
|
|
17.
|
|
|
18.
|
|
|
19.
|
|
|
20.
|
|