|
961.
|
Divided self: an existential study in sanity and madness
by Laing, R. D. Publisher: New York : Penguin Books, 2010Availability: Items available for loan: [Call number: 157.282092 LAI] (1).
|
|
962.
|
Blockchain for healthcare systems : challenges, privacy, and securing of data
by Idrees, Sheikh Mohammad | Agarwal, Parul [ed.] | Alam, M. Afshar [ed.]. Publisher: Boca Raton ; CRC Press, 2022Availability: Items available for loan: [Call number: 610.285 IDR] (1).
|
|
963.
|
VLSI and hardware implementations using modern machine learning methods
by Saini, Sandeep [ed.] | Lata, Kusum [ed.] | Sinha, G. R [ed.]. Publisher: Boca Raton : CRC Press , 2022Availability: Items available for loan: [Call number: 006.31 SAI] (1).
|
|
964.
|
Handbook of food and anthropology
by Klein, Jakob A [ed.] | Watson, James L [ed.]. Publisher: 2016 Bloomsbury Academic, LondonAvailability: Items available for loan: [Call number: 394.12 KLE] (1).
|
|
965.
|
Combinatorics and number theory of counting sequences
by Istvan, Mezo. Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 511.6 IST] (1).
|
|
966.
|
Sensors, cloud, and fog : the enabling technologies for the internet of things
by Misra, Sudip | Sarkar, Subhadeep | Chatterjee, Subarna. Publisher: 2019 Taylor & Francis Group, Boca RatonAvailability: Items available for loan: [Call number: 004.678 MIS] (1).
|
|
967.
|
Automation and utopia : human flourishing in a world without work
by Danaher, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge : Harvard University Press, 2019Availability: Items available for loan: [Call number: 335.02 DAN] (1).
|
|
968.
|
Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us
by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
|
|
969.
|
Trafficking data : how China is winning the battle for digital sovereignty
by Kokas, Aynne. Publisher: New York : Oxford University Press, 2023Availability: Items available for loan: [Call number: 323.4480951 KOK] (1).
|
|
970.
|
Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
by Nita, Stefania Loredana | Mihailescu, Marius Iulian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.82 NIT] (1).
|
|
971.
|
Cybersecurity analytics
by Verma, Rakesh M | Marchette, David J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 005.8 VER] (1).
|
|
972.
|
Ethical and secure computing : a concise module
by Kizza, Joseph Migga. Edition: 3rd ed. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
973.
|
If it's smart, it's vulnerable
by Hypponen, Mikko. Publisher: Hoboken : Wiley, 2022Availability: Items available for loan: [Call number: 005.8 HYP] (1).
|
|
974.
|
NTP security : a quick-start guide
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Apress, 2016Availability: Items available for loan: [Call number: 004.62 LIS] (1).
|
|
975.
|
Practical mathematical cryptography
by Gjosteen, Kristian. Publisher: Boca Raton : CRC Press, 2023Availability: Items available for loan: [Call number: 652.8 GJO] (1).
|
|
976.
|
Quantum key distribution : an introduction with exercises
by Wolf, Ramona. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 530.12 WOL] (1).
|
|
977.
|
Secure MultiParty Computation Against Passive Adversaries
by Choudhury, Ashish | Patra, Arpita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 005.8 CHO] (1).
|
|
978.
|
Secure web application development : a hands-on guide with Python and Django
by Baker, Matthew. Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.8 BAK] (1).
|
|
979.
|
Trusted cellular IoT devices : design ingredients and concepts
by Heins, Kersten. Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 004.6782 HEI] (1).
|
|
980.
|
Enterprise level security 1 - 2 : advanced topics in an uncertain world
by Foltz, Kevin E | Simpson, William Randolph. Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 005.8 FOL] (2).
|