Your search returned 56 results. Subscribe to this search

|
1. Contemporary Cryptography

by OPPLIGER, ROLF.

Edition: 2 Ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London Artech House 2011Availability: Items available for loan: [Call number: 005.82 OPP] (1). Items available for reference: [Call number: 005.82 OPP] (1).

2. An Introduction to the Analysis of Algorithms

by SEDGEWICK, ROBERT | FLAJOLET, PHILIPPE.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Addison-Wesley 1996Availability: Items available for loan: [Call number: 005.1 SED] (4). Items available for reference: [Call number: 005.1 SED] (1).

3. Digital Watermarking and Steganography

by COX, INGEMAR J ...[et al.].

Edition: 2 Ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amestordom Elsevier 2008Availability: Items available for loan: [Call number: 005.8 COX] (1). Items available for reference: [Call number: 005.8 COX] (1).

4. Software Engineering : design, reliability and management

by SHOOMAN , MARTIN L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill book company 1983Availability: Items available for loan: [Call number: 005.1 SHO] (4). Checked out (1).

5. Advances in Real Time Systems edited by STANKOVIC,JOHN A and RAMAMRITHAM, KRITHI

by RAMAMRITHAM, KRITHI.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New york IEEE Press 1993Availability: Items available for loan: [Call number: 004.33 STA] (1).

6. Computer graphics: principles & practice

by Foley, James D | Dam, Andries. Van | Feiner, Steven. K | hughes, John. F.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading, Mass. : Addison-Wesley, c1990Availability: Items available for reference: [Call number: 006.6 FOL] (1).

7. Advanced optical communication systems and networks

by Cvijetic, Milorad | Djordjevic, Ivan B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Artech house c2013Availability: Items available for reference: [Call number: 621.382 CVI] (1).

8. Virtual reality and animation for MATLAB and Simulink users : visualization of dynamic models and control simulations / Nassim Khaled.

by Khaled, Nassim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London ; New York : Springer, c2012Availability: Items available for reference: [Call number: 006.8 KHA] (1).

9. Embedded multimedia security systems algorithms and architectures Amit Pande, Joseph Zambreno.

by Pande, Amit | Zambreno, Joseph.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London New York Springer c2013Other title: Embedded systems for smart appliances and energy management.Availability: Items available for reference: [Call number: 006.7 PAN] (1).

10. Handbook of discrete and combinatorial mathematics / Kenneth H. Rosen, editor-in-chief, John G. Michaels, project editor ... [et al.].

by Rosen, Kenneth H | Michaels, John G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, c2000Availability: Items available for reference: [Call number: 511.6 ROS] (1).

11. Distributed networks : intelligence, security, and applications / edited by Qurban A. Memon.

by Memon,Qurban A., (ed.) | Memon, Qurban A. (Qurban Ali).

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Crc Press 2014Online access: Cover image Availability: Items available for reference: [Call number: 005.8 MEM] (1).

12. Video surveillance for sensor platforms algorithms and architectures Mayssaa Al Najjar.

by Najjar, Mayssaa Al | Ghantous,Milad | Bayoumi,Magdy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Springer 2014Availability: Items available for reference: [Call number: 006.6 NAJ] (1).

13. Cryptography for security and privacy in cloud computing

by Rass, Stefan | Slamaning, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London Artech House 2014Availability: Items available for reference: [Call number: 005.8 RAS] (1).

14. Handbook of 3D machine vision : optical metrology and imaging / edited by Song Zhang.

by Zhang, Song (ed.) | Song, Zhang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton CRC c2013Availability: Items available for reference: [Call number: 006.37 ZHA] (1).

15. Wireless mobile internet security Man Young Rhee, Endowed Chair Professor, Kyung Hee University, Professor Emeritus, Hanyang University, Republic of Korea.

by Rhee, Man Young.

Edition: Second edition.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: United kingdom Wiley c2013Availability: Items available for reference: [Call number: 004.678 RHE] (1).

16. Computational number theory / Abhijit Das.

by Das, Abhijit, 1968-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Crc Press 2013Online access: Cover image Availability: Items available for reference: [Call number: 512.70285 DAS] (2).

17. Handbook of communications security / F. Garzia.

by Garzia, F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Wit Press c2013Availability: Items available for reference: [Call number: 005.8 GAR] (1).

18. Text Mining With MATLAB / Rafael E. Banchs.

by Banchs, Rafael E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer, c2013Availability: Items available for loan: [Call number: 006.312 BAN] (1). Items available for reference: [Call number: 006.312 BAN] (1).

19. Wireless networking : understanding internetworking challenges / Jack L. Burbank,[et.al.]

by Burbank, Jack L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey John Wiley (c) 2013Availability: Items available for reference: [Call number: 004.6 BUR] (1).

20. Computer and information security handbook / edited by John R. Vacca.

by Vacca , John R.(ed.).

Edition: 2nd.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore Elsevier c2013Availability: Items available for reference: [Call number: 005.8 VAC] (1).