Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/971
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Computer Science | - |
dc.date.accessioned | 2017-08-31T11:10:08Z | - |
dc.date.available | 2017-08-31T11:10:08Z | - |
dc.date.issued | 2015-07 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/971 | - |
dc.language.iso | en_US | en_US |
dc.title | Network Security and Cryptography | en_US |
Appears in Collections: | 4th Year |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Eighth Sem 2015 .pdf | 35.28 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.