Hardware security: Design, threats, and safeguards. by Debdeep Mukhopadhyay
By: Mukhopadhyay, Debdeep [Author]
.
Material type: 

Item type | Current location | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
RGU Central Library Reference | Reference | 005.8 MUK-H (Browse shelf) | Not For Loan | 80134 |
Total holds: 0
Browsing RGU Central Library Shelves , Shelving location: Reference , Collection code: Reference Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 KOH-C Complete guide to cybersecurity risks and controls | 005.8 KOH-I Implementing cybersecurity | 005.8 MCC-A Assessing and managing security risk in IT systems | 005.8 MUK-H Hardware security: | 005.8 OSB-E Essentials of cybersecurity: | 005.8 OSB-E Essentials of cybersecurity: | 005.8 PAU-Q 7 qualities of highly secure software |
There are no comments for this item.