|
2841.
|
Object-oriented project management with UML
by Cantor, Murray. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 005.117 CAN] (1).
|
|
2842.
|
Secrets and lies: Digital security in a networked world
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
2843.
|
Principles of form and design
by Wong, Wucius. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1993Availability: Items available for loan: [Call number: 745.4 WON] (1).
|
|
2844.
|
Highnoon
by Southwick, Karen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1999Availability: Items available for loan: [Call number: 004.092 SOU] (1).
|
|
2845.
|
Kalman filtering and neural networks
by Haykin, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Wiley, 2001Availability: Items available for loan: [Call number: 006.32 HAY] (1).
|
|
2846.
|
Wiley encyclopedia of computer science and engineering
by Wah, Benjamin W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2009Availability: Items available for loan: [Call number: 004.03 WAH ] (5).
|
|
2847.
|
Excel for scientists and engineers : numerical methods
by Billo, E. Joseph. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 620.002855369 BIL] (2).
|
|
2848.
|
Planning for PKI: Best practices guide for deploying public key infrastructure
by Housley, Russ | Polk, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
|
|
2849.
|
Enterprise Integration
by Cummins, Fred A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 004.22 CUM] (1).
|
|
2850.
|
Enterprise Security With EJB and CORBA
by Hartman, Bret. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
2851.
|
Advanced computer arithmetic design
by Oberman, Stuart F | Flynn, Michael J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Wiley-Blackwell, 2001Availability: Items available for loan: [Call number: 004.01513 FLY] (1).
|
|
2852.
|
Designing Security Architecture Solutions
by Ramachandran, Jay. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 RAM] (1).
|
|
2853.
|
Art of 3-D: Computer Animation and Effects
by Kerlow, Isaac V. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 006.696 KER] (1).
|
|
2854.
|
Content Distribution Networks
by Verma, Dinesh C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 621.382 VER] (1).
|
|
2855.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
2856.
|
Software testing and analysis : process, principles, and techniques
by Pezze, Mauro | Young, Michal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2006Availability: Items available for loan: [Call number: 005.14 PEZ] (1).
|
|
2857.
|
Legitimate applications of peer-to-peer networks
by Verma, Dinesh C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2004Availability: Items available for loan: [Call number: 004.65 VER] (1).
|
|
2858.
|
Java in Telecommunications
by Jepsen, Thomas. C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.73 JEP] (1).
|
|
2859.
|
Pattern approach to interaction design
by Borchers, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 004.019 BOR] (1).
|
|
2860.
|
Device modeling for analog and RF CMOS circuit design
by Cheng, Yuhua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 621.395 YTT] (1).
|