Results
|
41.
|
|
|
42.
|
|
|
43.
|
Data structures and algorithms in Java by
Edition: 3rd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Wiley, 2004
Availability: Items available for loan: IIITD (4)Call number: 005.73 GOO-D, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.73 GOO-D.
|
|
44.
|
C programming : a modern approach by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : W. W. Norton, c2008
Availability: Items available for loan: IIITD (1)Call number: 005.133 KIN-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.133 KIN-C.
|
|
45.
|
|
|
46.
|
Core python programming by Series: Prentice Hall PTR core series
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, c2007
Availability: Items available for loan: IIITD (7)Call number: 005.133 CHU-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.133 CHU-C. Not available: IIITD: Withdrawn (2).
|
|
47.
|
|
|
48.
|
Probability and statistics for computer science by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, NJ : Wiley, 2003
Availability: Items available for loan: IIITD (1)Call number: 519.202 JOH-P.
|
|
49.
|
Security engineering : a guide to building dependable distributed systems by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Wiley, c2008
Availability: Items available for loan: IIITD (4)Call number: 005.8 AND-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 AND-S.
|
|
50.
|
|
|
51.
|
Scene of cybercrime by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington : Syngress, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SHI-S.
|
|
52.
|
|
|
53.
|
|
|
54.
|
|
|
55.
|
|
|
56.
|
Crimeware : understanding new attacks and defenses by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 JAK-C.
|
|
57.
|
Introduction to computer security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston : Addison-Wesley, c2005
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BIS-I.
|
|
58.
|
|
|
59.
|
Microsoft encyclopedia of security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Redmond, Wash. : Microsoft Press, 2003
Availability: Items available for loan: IIITD (1)Call number: REF 005.803 TUL-M.
|
|
60.
|
Software project management in practice by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston : Addison-Wesley, ©2002
Availability: Items available for loan: IIITD (1)Call number: 005.106 JAL-S. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.106 JAL-S. Not available: IIITD: Loan on demand (1).
|