The eclipse of Christ in eschatology : toward a christ-centered approach / Adrio Konig.
By: Material type:
- 0802803563
- BT 821.2 .K66
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Athi-River Campus Open Shelves | BT 821.2.K66 (Browse shelf(Opens below)) | c.2 | Available | BK005329 | ||
![]() |
Athi-River Campus Open Shelves | BT 821.2.K66 (Browse shelf(Opens below)) | c. 3 | Available | BK005330 | ||
![]() |
Nairobi Campus Store | BT 821.2.K66 (Browse shelf(Opens below)) | c. 1 | Weeded | BK028741 |
There are no comments on this title.
Log in to your account to post a comment.
-
281
Old-age income support in the 21st century
by Holzmann, Robert. -
282
Degunking your email, snam, and viruses
by Duntemann, Jeff. -
283
Role-based access control
by Ferraiolo, David. -
284
Mission-critical network planning
by Liotine, Matthew. -
285
Developing secure distributed systems with CORBA
by Lang, Ulrich. -
286
Security technologies for the World Wide Web
by Oppliger, Rolf. -
287
Introduction to communication electronic warfare systems
by Poisel, Richard. -
288
Defense and detection strategies against Internet worms
by Nazario, Jose. -
289
Outsourcing information security
by Axelrod, C. Warren. -
290
User's guide to cryptography and standards
by Dent, Alexander W. -
291
Privacy protection and computer forensics
by Caloyannides, Michael A. -
292
Techniques and applications of digital watermarking and content protection
by Arnold, Michael -
293
A practical guide to managing information security
by Purser, Steve. -
294
Bluetooth security
by Gehrmann, Christian. -
295
Limiting institutions?
-
296
Intelligent watermarking techniques
-
297
Host integrity monitoring
by Wotring, Brian. -
298
Irrelevant or indispensable?
-
299
Perils of dominance
by Porter, Gareth, -
300
Navy's needs in space for providing future capabilities