Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
KWUST-Main Library General Stacks | Non-fiction | QA 76.9.A25 .C5985 2008 (Browse shelf(Opens below)) | C.1 | Available | 13/2779 | |
![]() |
KWUST-Main Library General Stacks | Non-fiction | QA 76.9.A25 .C5985 2008 (Browse shelf(Opens below)) | C.2 | Available | 13/2780 | |
![]() |
KWUST-Main Library General Stacks | Non-fiction | QA 76.9.A25 .C5985 2008 (Browse shelf(Opens below)) | C.3 | Available | 13/2781 |
Browsing KWUST-Main Library shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA 76.9 .343 A38 2021 Advanced data mining and applications 17th international conference ,ADMA 2021 SYDNEY ,Australia,February 2-4,2022 proceedings, part II | QA 76.9.A25 .C5985 2008 Network Security Bible | QA 76.9.A25 .C5985 2008 Network Security Bible | QA 76.9.A25 .C5985 2008 Network Security Bible | QA 76.9.A25 .P45 2011 Security in Computing | QA 76.9.A25 .P45 2011 Security in Computing | QA 76.9.A25 .P45 2011 Security in Computing |
There are no comments on this title.
Log in to your account to post a comment.