Item type | Current library | Home library | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92121 | ||||
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92122 | ||||
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92123 | ||||
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92124 | ||||
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92125 | ||||
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92126 | ||||
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92127 | ||||
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92128 | ||||
Books and Monographs | Central Library, NIT Jalandhar General Stacks | Central Library, NIT Jalandhar | Available | 92129 | ||||
Books and Monographs | Central Library, NIT Jalandhar Reference | Central Library, NIT Jalandhar | 005.8 BI-I (Browse shelf(Opens below)) | Available | 92120 |
Browsing Central Library, NIT Jalandhar shelves, Shelving location: Reference Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | |||
005.759 CA-M The Management of Network Security | 005.759 HO-M Modern Database Management | 005.7592 BL-A ASP.NET 3.5 | 005.8 BI-I Introduction to Computer Security | 005.8 CO-N Network Security Bible | 005.8 DR-A Android hacker's handbook | 005.8 GO-C Cyber Security: Understanding cyber crimes, computer forensics and perspectives |