Item type | Current library | Collection | Shelving location | Call number | Materials specified | Status | Notes | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|---|
Books | BMU Library | Reference | 1-E | 005.8 SAN (Browse shelf(Opens below)) | Not For Loan | SOET | 12129 | |||
Books | BMU Library | Text Books | 6-A | 005.8 SAN (Browse shelf(Opens below)) | Available | SOET | 12130 |
Browsing BMU Library shelves, Shelving location: 1-E, Collection: Reference Close shelf browser (Hides shelf browser)
005.8 ORI Hacker techniques, tools, and incident handling | 005.8 PFL Security in computing | 005.8 RAH Automation with ansible | 005.8 SAN CCNA security 210-260 | 005.8 SHA Fundamentals of cyber security and laws | 005.8 STA Star cyber secure user | 005.8 TIL Ethical hack :A framework for business value penetration testing |
There are no comments on this title.
Log in to your account to post a comment.