|
2581.
|
Managing cyber threats : issues, approaches, and challenges
by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
|
|
2582.
|
Scalable hardware verification with symbolic simulation
by Bertacco, Valeria. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.392 BER] (1).
|
|
2583.
|
Peer-to-peer computing for mobile networks : information discovery and dissemination
by Papadopouli, Maria | Schulzrinne, Henning. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 621.382 PAP] (1).
|
|
2584.
|
Classical introduction to cryptography : applications for communications security
by Vaudenay, Serge. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAU] (1).
|
|
2585.
|
Hardware verification with C++ : a practitioner's handbook
by Mintz, Mike | Ekendahl, Robert. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.3815 MIN] (2).
|
|
2586.
|
Computer algebra recipes : an introductory guide to the mathematical models of science
by Enns, Richard H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 530.0785 ENN] (2).
|
|
2587.
|
Computer algebra recipes : an advanced guide to scientific modeling
by Enns, Richard H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 501.51 ENN] (2).
|
|
2588.
|
Guide to assembly language programming in Linux
by Dandamudi, Sivarama P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.136 DAN] (2).
|
|
2589.
|
Data warehousing and data mining techniques for cyber security
by Singhal, Anoop. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.312 SIN] (1).
|
|
2590.
|
SystemVerilog for verification : a guide to learning the testbench language features
by Spear, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.392 SPE] (1).
|
|
2591.
|
Digital signatures
by Katz, Jonathan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAT] (1).
|
|
2592.
|
Classical introduction to cryptography exercise book
by Baigneres, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BAI] (1).
|
|
2593.
|
Wireless network security
by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
|
|
2594.
|
Data streams : models and algorithms
by Aggarwal, Charu C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 518.1 AGG] (1).
|
|
2595.
|
Cryptographics : exploiting graphics cards for security
by Keromytis, Angelos D | Cook, Debra L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 COO] (1).
|
|
2596.
|
Computing the continuous discretely : integer-point enumeration in polyhedra
by Beck, Matthias | Robins, Sinai. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 516.11 BEC] (1).
|
|
2597.
|
Similarity search : the metric space approach
by Zezula, Pavel | Amato, Giuseppe | Batko, Michal | Dohnal, Vlastislav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.741 ZEZ] (1).
|
|
2598.
|
Electronic postage systems : technology, security, economics
by Bleumer, Gerrit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 383.0285 BLE] (1).
|
|
2599.
|
Routing congestion in VLSI circuits : estimation and optimization
by Saxena, Prashant | Sapatnekar, Sachin S | Shelar, Rupesh S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.395 SAX] (1).
|
|
2600.
|
Computer viruses and malware
by Aycock, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
|