4841. Designing reliable distributed systems : a formal methods approach based on executable modeling in maude

by Olveczky, Peter Csaba.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Springer, 2017Availability: Items available for loan: [Call number: 004.36 OLV] (1).
4842. A guide to kernel exploitation : attacking the core

by Perla, Enrico | Massimiliano, Oldani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
4843. Deep neural networks in a mathematical framework

by Caterini, Anthony L | Chang, Dong Eui.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 006.32 CAT] (1).
4844. Guide to graph algorithms : sequential, parallel and distributed

by Erciyes, K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 518​.1 ERC] (1).
4845. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
4846. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
4847. Understanding high-dimensional spaces

by Skillicorn, David B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer, 2012Availability: Items available for loan: [Call number: 006.3​12 SKI] (1).
4848. Guide to teaching puzzle-based learning

by Meyer, Edwin F., III | Falkner, Nickolas | Sooriamurthi, Raja | Michalewicz, Zbigniew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Springer, 2014Availability: Items available for loan: [Call number: 370.15​24 MEY] (1).
4849. Introduction to distance geometry applied to molecular geometry

by Lavor, Carlile | Liberti, Leo | Lodwick, Weldon A | Mendonça da Costa, Tiago.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 004 LAV] (1).
4850. Primer on client-side web security

by De Ryck, Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
4851. Security and privacy in cyber-physical systems : foundations, principles, and applications

by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
4852. Guide to automotive connectivity and cybersecurity : trends, technologies, innovations and applications

by Möller, Dietmar P. F | Haas, Roland E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2019Availability: Items available for loan: [Call number: 338.476292 MOL] (1).
4853. Anomaly detection principles and algorithms

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 006.312 MEH] (1).
4854. DNS security : defending the Domain Name System

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
4855. Fuzzing for software security testing and quality assurance 2nd ed.

by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte.

Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
4856. Differential privacy : from theory to practice

by Li, Ninghui | Lyu, Min | Su, Dong | Yang, Weining.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Morgan & Claypool Publishers , 2017Availability: Items available for loan: [Call number: 005.80151 LIN] (1).
4857. CryptoSchool

by Gathen, Joachim von zur.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin : Springer, 2015Availability: Items available for loan: [Call number: 005.74 GAT] (1).
4858. Security of block ciphers : from algorithm design to hardware implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
4859. Introduction to computational economics using fortran

by Fehr, Hans | Kindermann, Fabian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford : Oxford University Press, 2018Availability: Items available for loan: [Call number: 330.0113 FEH] (1).
4860. Nonlinear Eigenproblems in image processing and computer vision

by Gilboa, Guy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer, 2018Availability: Items available for loan: [Call number: 006.37 GIL] (1).

Powered by Koha