241. Nuclear weapons : a very short introduction

by Siracusa, Joseph M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford: Oxford University Press, 2008Availability: Items available for loan: [Call number: 623.45119 SIR] (1).
242. Software Quality Assurance : from theory to implementation

by Galin, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Pearson Addison Wesley, 2004Availability: Items available for loan: [Call number: 005.10685 GAL] (1).
243. Cleanroom Software Engineering : technology and process

by Prowell, Stacy J | Linget, Richard C | Poore, Jesse H | Trammell, Carmen J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.1 PRO] (1).
244. Seeing like a Rover : how robots, teams, and images craft knowledge of Mars

by Vertesi, Janet.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chicago: University of Chicago Press, 2015Availability: Items available for loan: [Call number: 523.430723 VER] (1).
245. Maximum willpower : how to master the new science of self-control

by McGonigal, Kelly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: MacMillan, 2012Availability: Items available for loan: [Call number: 153.8 MCG] (1).
246. Signals and boundaries : building blocks for complex adaptive systems

by Holland, John H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2012Availability: Items available for loan: [Call number: 003 HOL] (1).
247. Mathematical modeling in systems biology : an introduction

by Ingalls, Brian P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2013Availability: Items available for loan: [Call number: 571.7 ING] (1).
248. Principle of cyber-physical systems

by Alur, Rajeev.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2015Availability: Items available for loan: [Call number: 006.22 ALU] (1).
249. Access denied : the practice and policy of global Internet filtering

by Deibert, Ronald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2008Availability: Items available for loan: [Call number: 005.8 DEI] (1).
250. Adaptation in natural and artificial systems: An introductory analysis with applications to biology control, and artificial intelligence

by Holland, John H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 1992Availability: Items available for loan: [Call number: 570 HOL] (1).
251. Secure programming with static analysis

by Chess, Brian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (2).
252. Mathematical Foundations of Computer Networking

by Keshav, Srinivasan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2013Availability: Items available for loan: [Call number: 004.601519 KES] (1).
253. Access control systems : security, identity management and trust models

by Benantar, Messaoud.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
254. Process Assessment and Improvement : a practical guide for managers, quality professionals, and assessors

by Loon, Han van.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 005 LOO] (1).
255. Adaptive nonlinear system identification : the Volterra and Wiener model approaches

by Ogunfunmi, Tokunbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 003.1 OGU] (1).
256. Privacy-respecting intrusion detection

by Flegel, Ulrich.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
257. Networked sensing information and control

by Saligrama, Venkatesh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 629.8312 SAL] (1).
258. Securing biometrics applications

by Shoniregun, Charles A | Crosier, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 363.23 SHO] (1).
259. Smart cards, tokens, security and applications

by Mayes, Keith E | Markantonakis, Konstantinos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
260. Trust Management

by Etalle, Sandro | Marsh, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).

Powered by Koha