Refine your search

Your search returned 17439 results.

Sort
Results
601.
Algorithms unlocked by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : MIT Press, c2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.1 COR-A.
  (1 votes)
602.
From counterculture to cyberculture : Stewart Brand, the Whole Earth Network, and the rise of digital utopianism by
Material type: Text Text; Format: print ; Nature of contents: biography; Literary form: Not fiction
Publication details: Chicago : University of Chicago Press, 2006
Other title:
  • Stewart Brand, the Whole Earth Network, and the rise of digital utopianism
Availability: Items available for loan: IIITD (1)Call number: 303.48 TUR-F.

603.
ARM assembly language : fundamentals and techniques by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, ©2009
Availability: Items available for loan: IIITD (1)Call number: 005.262 HOH-A.

604.
Evolutionary computation : a unified approach by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi. : PHI Learning, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.1 JON-E.

605.
Modern compiler implementation in Java by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi.; Cambridge University press, 2000
Availability: Items available for loan: IIITD (2)Call number: 005.453 APP-M, ...

606.
Understanding concurrent systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi.: Springer ©2010
Availability: Items available for loan: IIITD (1)Call number: 004.35 ROS-U.

607.
Approximation algorithms by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, ©2001
Availability: Items available for loan: IIITD (1)Call number: 005.1 VAZ-A.

608.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

609.
Exceptional presenter goes virtual : take command of your message, create an "in-person" experience and captivate any remote audience by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Austin, Texas. : Greenleaf Book Group Press ; ©2010
Availability: Items available for loan: IIITD (1)Call number: 658.452 KOE-E.

610.
Energy efficient distributed computing systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 004.36 ZOM-E.

611.
SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, c1999
Availability: Items available for loan: IIITD (1)Call number: 004.62 STA-S.

612.
Principles of digital image processing : core algorithms by Series: Undergraduate topics in computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Springer, ©2009
Other title:
  • Core algorithms
Availability: Items available for loan: IIITD (1)Call number: REF 621.367 BUR-P.

613.
Information theory in computer vision and pattern recognition by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher number:
  • 12026111
Publication details: New York : Springer, ©2009
Availability: Items available for loan: IIITD (1)Call number: 003.54 ESC-I.

614.
Calculus for computer graphics by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Springer, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 006.601 VIN-C.

615.
Common system and software testing pitfalls : how to prevent and mitigate them : descriptions, symptoms, consequences, causes, and recommendations by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Pearson, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.302 FIR-C.

616.
Security patterns in practice : designing secure architectures using software patterns by Series: Wiley series in software design patterns
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex : Wiley, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 FER-S.

617.
Software test attacks to break mobile and embedded devices by Series: Chapman & Hall/CRC innovations in software engineering and software development series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Taylor & Francis, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 HAG-S.

618.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

619.
Dynamic programming by Series: Princeton landmarks in mathematics
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Princeton, NJ : Princeton University Press, ©2010
Availability: Items available for loan: IIITD (1)Call number: REF 519.703 BEL-D.

620.
Principles of computational modelling in neuroscience by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Cambridge University Press, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 612.801 STE-P.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in