2581. Managing cyber threats : issues, approaches, and challenges

by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
2582. Scalable hardware verification with symbolic simulation

by Bertacco, Valeria.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.392 BER] (1).
2583. Peer-to-peer computing for mobile networks : information discovery and dissemination

by Papadopouli, Maria | Schulzrinne, Henning.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 621.382 PAP] (1).
2584. Classical introduction to cryptography : applications for communications security

by Vaudenay, Serge.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAU] (1).
2585. Hardware verification with C++ : a practitioner's handbook

by Mintz, Mike | Ekendahl, Robert.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.3815 MIN] (2).
2586. Computer algebra recipes : an introductory guide to the mathematical models of science

by Enns, Richard H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 530.0785 ENN] (2).
2587. Computer algebra recipes : an advanced guide to scientific modeling

by Enns, Richard H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 501.51 ENN] (2).
2588. Guide to assembly language programming in Linux

by Dandamudi, Sivarama P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.136 DAN] (2).
2589. Data warehousing and data mining techniques for cyber security

by Singhal, Anoop.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.312 SIN] (1).
2590. SystemVerilog for verification : a guide to learning the testbench language features

by Spear, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.392 SPE] (1).
2591. Digital signatures

by Katz, Jonathan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAT] (1).
2592. Classical introduction to cryptography exercise book

by Baigneres, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BAI] (1).
2593. Wireless network security

by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
2594. Data streams : models and algorithms

by Aggarwal, Charu C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 518.1 AGG] (1).
2595. Cryptographics : exploiting graphics cards for security

by Keromytis, Angelos D | Cook, Debra L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 COO] (1).
2596. Computing the continuous discretely : integer-point enumeration in polyhedra

by Beck, Matthias | Robins, Sinai.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 516.11 BEC] (1).
2597. Similarity search : the metric space approach

by Zezula, Pavel | Amato, Giuseppe | Batko, Michal | Dohnal, Vlastislav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.741 ZEZ] (1).
2598. Electronic postage systems : technology, security, economics

by Bleumer, Gerrit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 383.0285 BLE] (1).
2599. Routing congestion in VLSI circuits : estimation and optimization

by Saxena, Prashant | Sapatnekar, Sachin S | Shelar, Rupesh S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.395 SAX] (1).
2600. Computer viruses and malware

by Aycock, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).

Powered by Koha