|
4841.
|
Designing reliable distributed systems : a formal methods approach based on executable modeling in maude
by Olveczky, Peter Csaba. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Springer, 2017Availability: Items available for loan: [Call number: 004.36 OLV] (1).
|
|
4842.
|
A guide to kernel exploitation : attacking the core
by Perla, Enrico | Massimiliano, Oldani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
4843.
|
Deep neural networks in a mathematical framework
by Caterini, Anthony L | Chang, Dong Eui. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 006.32 CAT] (1).
|
|
4844.
|
Guide to graph algorithms : sequential, parallel and distributed
by Erciyes, K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer International Publishing, 2018Availability: Items available for loan: [Call number: 518.1 ERC] (1).
|
|
4845.
|
Homomorphic encryption and applications
by Yi, Xun | Paulet, Russell | Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.82 YIX] (1).
|
|
4846.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
4847.
|
Understanding high-dimensional spaces
by Skillicorn, David B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer, 2012Availability: Items available for loan: [Call number: 006.312 SKI] (1).
|
|
4848.
|
Guide to teaching puzzle-based learning
by Meyer, Edwin F., III | Falkner, Nickolas | Sooriamurthi, Raja | Michalewicz, Zbigniew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Springer, 2014Availability: Items available for loan: [Call number: 370.1524 MEY] (1).
|
|
4849.
|
Introduction to distance geometry applied to molecular geometry
by Lavor, Carlile | Liberti, Leo | Lodwick, Weldon A | Mendonça da Costa, Tiago. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 004 LAV] (1).
|
|
4850.
|
Primer on client-side web security
by De Ryck, Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8 DER] (1).
|
|
4851.
|
Security and privacy in cyber-physical systems : foundations, principles, and applications
by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
|
|
4852.
|
Guide to automotive connectivity and cybersecurity : trends, technologies, innovations and applications
by Möller, Dietmar P. F | Haas, Roland E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2019Availability: Items available for loan: [Call number: 338.476292 MOL] (1).
|
|
4853.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 006.312 MEH] (1).
|
|
4854.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
4855.
|
Fuzzing for software security testing and quality assurance 2nd ed.
by Takanen, Ari | DeMott, Jared | Miller, Charlie | Kettunen, Atte. Publisher: Boston : Artech House, 2018Availability: Items available for loan: [Call number: 005.8 TAK] (1).
|
|
4856.
|
Differential privacy : from theory to practice
by Li, Ninghui | Lyu, Min | Su, Dong | Yang, Weining. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: S.l. : Morgan & Claypool Publishers , 2017Availability: Items available for loan: [Call number: 005.80151 LIN] (1).
|
|
4857.
|
CryptoSchool
by Gathen, Joachim von zur. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin : Springer, 2015Availability: Items available for loan: [Call number: 005.74 GAT] (1).
|
|
4858.
|
Security of block ciphers : from algorithm design to hardware implementation
by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
|
|
4859.
|
Introduction to computational economics using fortran
by Fehr, Hans | Kindermann, Fabian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Oxford : Oxford University Press, 2018Availability: Items available for loan: [Call number: 330.0113 FEH] (1).
|
|
4860.
|
Nonlinear Eigenproblems in image processing and computer vision
by Gilboa, Guy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer, 2018Availability: Items available for loan: [Call number: 006.37 GIL] (1).
|