Refine your search

Your search returned 7609 results.

Sort
Results
101.
Network security essentials : applications and standards by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.

102.
Graphs and algorithms in communication networks : studies in broadband, optical, wireless and ad hoc networks by Series: Texts in theoretical computer science. an eatcs series ; 3214
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2009
Availability: Items available for loan: IIITD (1)Call number: REF 004.6 KOS-G.

103.
Circuits of the mind by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©1994
Availability: Items available for loan: IIITD (1)Call number: REF 612.82 VAL-C.

104.
Large networks and graph limits by Series: American Mathematical Society colloquium publications ; volume 60
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: America: American Mathematical Society, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 511.5 LOV-L.

105.
Theoretical neuroscience : computational and mathematical modeling of neural systems by Series: Computational neuroscience
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge, Mass. : MIT, ©2001
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 573.80 DAY-T.

106.
SQL injection attacks and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.

107.
Machine learning, neural and statistical classification by Series: Ellis Horwood series in artificial intelligence
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Overseas Press 1994
Availability: Items available for loan: IIITD (1)Call number: 006.31 MIC-M.

108.
Privacy and security for cloud computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.6782 PEA-P.

109.
New media techniques and trends by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Vitasta Publishing Pvt.Ltd, C2008
Availability: Items available for loan: IIITD (1)Call number: 302.2 RAZ-N.

110.
Networked multisensor decision and estimation fusion : based on advanced mathematical methods by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : Taylor & Francis, c2013
Availability: Items available for loan: IIITD (1)Call number: REF 681.2 ZHU-N.

111.
From counterculture to cyberculture : Stewart Brand, the Whole Earth Network, and the rise of digital utopianism by
Material type: Text Text; Format: print ; Nature of contents: biography; Literary form: Not fiction
Publication details: Chicago : University of Chicago Press, 2006
Other title:
  • Stewart Brand, the Whole Earth Network, and the rise of digital utopianism
Availability: Items available for loan: IIITD (1)Call number: 303.48 TUR-F.

112.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

113.
Energy efficient distributed computing systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.36 ZOM-E.

114.
SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, c1999
Availability: Items available for loan: IIITD (1)Call number: 004.62 STA-S.

115.
Security patterns in practice : designing secure architectures using software patterns by Series: Wiley series in software design patterns
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex : Wiley, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 FER-S.

116.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

117.
Networking wireless sensors by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized;
Publication details: New Delhi : Cambridge University Press, ©2005
Availability: Items available for loan: IIITD (2)Call number: 004.68 KRI-N, ...

118.
Give and take : a revolutionary approach to success by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Phoenix, c2013
Availability: Items available for loan: IIITD (1)Call number: 158.2 GRA-G.

119.
An introduction to client/server computing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : New Age international, ©2009
Availability: Items available for loan: IIITD (1)Call number: 004.36 YAD-I.

120.
The structure and dynamics of networks by Series: Princeton studies in complexity
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : New Age, c2006
Availability: Items available for loan: IIITD (1)Call number: 004.6 NEW-S.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in