Refine your search

Your search returned 4332 results.

Not what you expected? Check for suggestions
SNMP-based ATM network management Heng Pan.

by Pan, Heng.

Publisher: Boston : Artech House, c1998Availability: Items available for loan: Central Library (CL)Call number: 005.71 PAN (1).
Understanding Web services : XML, WSDL, SOAP, and UDDI Eric Newcomer.

by Newcomer, Eric.

Publisher: Boston : Addison-Wesley, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.72 NEW (2).
Effective TCP/IP programming : 44 tips to improve your network programming Jon C. Snader.

by Snader, Jon C.

Publisher: Boston : Addison-Wesley, c2000Availability: Items available for loan: Central Library (CL)Call number: 005.71376 SNA (2).
Essential XML: beyond markup beyond markup / Don Box, Aaron Skonnard, John Lam

by Box, Don | Skonnard, Aaron | Lam, John F.

Publisher: Boston : Addison-Wesley, cop. 2000Availability: Items available for loan: Central Library (CL)Call number: 005.72 BOX (1).
More excellent HTML with an introduction to JavaScript Timothy T. Gottleber, Timothy N. Trainor.

by Gottleber, Timothy T | Trainor, Timothy N, 1953-.

Publisher: Boston : Irwin/McGraw-Hill, c2000Availability: Items available for loan: Central Library (CL)Call number: 005.72 GOT (5).
Even more excellent HTML with XML, XHTML, and Javascript Timothy T. Gottleber, Timothy N. Trainor.

by Gottleber, Timothy T | Trainor, Timothy N, 1953-.

Publisher: Boston, Mass. : McGraw-Hill, 2003Availability: No items available : Checked out (1).
Database system concepts Abraham Silberschatz, Henry F. Korth, S. Sudarshan.

by Silberschatz, Abraham | Korth, Henry F | Sudarshan, S.

Edition: 4th ed., International ed. Publisher: Boston : McGraw-Hill, c2002Other title: Oracle8i : personal edition : version 8.1.5..Availability: Items available for loan: Central Library (CL)Call number: 005.74 SIL (5).
ASP internals Jon Flanders.

by Flanders, Jon.

Publisher: Boston : Addison-Wesley, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.72 FLA. (1).
Programming the Web using XML Ellen Pearlman, Eileen Mullin

by Pearlman, Ellen | Mullin, Eileen.

Publisher: Boston : McGraw-Hill Technology Education, c2004Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.72 PEA (2).
Data structures and the standard template library William J. Collins.

by Collins, William J.

Edition: 1st ed. Publisher: Boston : McGraw-Hill, 2003Online access: Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.73 COL (1).
Data structures and the Java collections framework William J. Collins

by Collins, William J.

Edition: 1. ed. Publisher: Boston : McGraw-Hill, 2002Availability: Items available for loan: Central Library (CL)Call number: 005.73 COL (1).
Data structures, algorithms, and applications in Java Sartaj Sahni.

by Sahni, Sartaj.

Publisher: Boston : McGraw-Hill, c2000Availability: No items available : Checked out (1).
Data structures & other objects using C++ Michael Main, Walter Savitch

by Main, Michael | Savitch, Walter J, 1943-.

Edition: 2. ed. Publisher: Boston : Addison Wesley, cop. 2001Availability: Items available for loan: Central Library (CL)Call number: 005.73 MAI (1).
Databases : design, development, and deployment : using Microsoft Access Peter Rob, Elie Semaan.

by Rob, Peter | Semaan, Elie.

Publisher: Boston : Irwin/McGraw-Hill, c2000Availability: Items available for loan: Central Library (CL)Call number: 005.7565 ROB (2).
Database application development and design Michael V. Mannino

by Mannino, Michael V.

Publisher: Boston : McGraw-Hill/Irvin, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.74 MAN (1).
Database systems : design, implementation, and management Peter Rob, Carlos Coronel

by Rob, Peter | Coronel, Carlos.

Edition: 5. ed. Publisher: Boston : Course Technology, 2002Availability: No items available : Checked out (1).
Database management systems : designing and building business applications Gerald V. Post

by Post, Gerald V.

Edition: 2nd ed Publisher: Boston, Mass. : McGraw-Hill, 2002Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 005.74 POS (1), Central Library (CL)Call number: 005.74 POS (1).
Practical issues in database management : a reference for the thinking practitioner Fabian Pascal.

by Pascal, Fabian.

Publisher: Boston, Mass. : Addison-Wesley, 2000Availability: Items available for loan: Central Library (CL)Call number: 005.74 PAS (1).
The CERT guide to system and network security practices Julia H. Allen.

by Allen, Julia H.

Publisher: Boston, MA ; Singapore : Addison-Wesley, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 ALL (1).
Techniques and applications of digital watermarking and content protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.

by Arnold, Michael | Schmucker, Martin | Wolthusen, Stephen D.

Publisher: Boston : Artech House, c2003Other title: Digital watermarking and content protection.Availability: Items available for loan: Central Library (CL)Call number: 005.8 ARN (1).
Bluetooth security Christian Gehrmann, Joakim Persson, Ben Smeets.

by Gehrmann, Christian | Persson, Joakim | Smeets, Ben.

Publisher: Boston : Artech House, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 GEH (1).
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors

by Katzenbeisser, Stefan [edt] | Petitcolas, Fabien A. P [edt].

Publisher: Boston : Artech House, cop. 2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAT (3).
Trojans, worms, and spyware: a computer security professional's guide to malicious code a computer security professional's guide to malicious code Michael Erbschloe

by Erbschloe, Michael.

Publisher: Amsterdam ; Boston : Elsevier Butterworth Heinemann, c2005Online access: Table of contents | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 ERB (1).
User's guide to cryptography and standards Alexander W. Dent, Chris J. Mitchell.

by Dent, Alexander W | Mitchell, Chris.

Publisher: Boston : Artech House, c2005Other title: Cryptography and standards.Availability: Items available for loan: Central Library (CL)Call number: 005.8 DEN (1).
Internet and Intranet security Rolf Oppliger.

by Oppliger, Rolf.

Edition: 2nd ed. Publisher: Boston, MA : Artech House, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 OPP (1).
Defense and detection strategies against Internet worms Jose Nazario.

by Nazario, Jose.

Publisher: Boston, MA : Artech House, 2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 NAZ (1).
Principles of computer security: Security+ and beyond Security+ and beyond Wm. Arthur Conklin ... [et al.].

by Conklin, Wm. Arthur.

Publisher: Boston, Mass. : McGraw-Hill Technology Education, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 CON (1).
.NET framework security Brian A. LaMacchia

by LaMacchia, Brian A.

Publisher: Boston : Addison-Wesley, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.8 LAM (1).
Privacy protection and computer forensics Michael A. Caloyannides.

by Caloyannides, Michael A | Caloyannides, Michael A.

Edition: 2nd ed. Publisher: Boston : Artech House, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAL (1).
Fundamentals of network security John E. Canavan.

by Canavan, John E.

Publisher: Boston : Artech House, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAN (1).
Security fundamentals for e-commerce Vesna Hassler ; Pedrick Moore, technical editor.

by Hassler, Vesna | Moore, Pedrick.

Publisher: Boston, MA : Artech House, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 HAS (1).
Network security: a practical approach a practical approach Jan L. Harrington.

by Harrington, Jan L.

Publisher: Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, c2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 (1).
Security in wireless LANs and MANs Thomas Hardjono, Lakshminath R. Dondeti.

by Hardjono, Thomas | Dondeti, Lakshminath R.

Publisher: Boston : Artech House, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 HAR (1).
Principles of information security Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed. Publisher: Boston, Mass. : Thomson Course Technology, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 WHI (1).
Firewalls : jumpstart for network and systems administrators jumpstart for network and systems administrators John R. Vacca, Scott Ellis.

by Vacca, John R | Ellis, Scott, 1968-.

Publisher: Amsterdam ; Boston : Elsevier Digital, c2005Online access: Table of contents | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VAC (1).
Software agent-based applications, platforms and development kits [Elektronisk resurs] [Elektronisk resurs] Rainer Unland, Matthias Klusch, Monique Calisti

by Unland, Rainer | Unland, Rainer | Klusch, Matthias, 1965- | Calisti, Monique | SpringerLink (Online service).

Publisher: Basel ; Boston : Birkhäµ³er Verlag, c2005Online access: Click here to access online | Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 006.33 UNL (1).
Microsoft data mining : integrated business intelligence for e-Commerce and knowledge management Barry de Ville.

by De Ville, Barry.

Publisher: Boston : Digital Press, c2001Online access: Publisher description | Table of Contents Availability: Items available for loan: Central Library (CL)Call number: 006.3 VIL (5).
Algorithms in ambient intelligence edited by Wim F.J. Verhaegh, Emile Aarts, Jan Korst

by Verhaegh, Wim F. J | Aarts, E. H. L | Korst, Jan.

Publisher: Dordrecht ; Boston : Kluwer Academic, c2004Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 006.3 VER (1).
Multimedia signals and systems Mrinal Kr. Mandal

by Mandal, Mrinal Kr.

Publisher: Boston : Kluwer Academic Publishers, 2003Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 006.7 MAN (1).
Agent-based software development Michael Luck, Ronald Ashri, Mark d'Inverno.

by Luck, Michael | Ashri, Ronald | D'Inverno, Mark.

Publisher: Boston : Artech House, c2004Availability: Items available for loan: Central Library (CL)Call number: 006.33 LUC (1).
Expert systems : principles and programming Joseph Giarratano, Gary Riley

by Giarratano, Joseph C | Riley, Gary D [oth].

Edition: 3. ed. Publisher: Boston, Mass. : PWS, 1998Availability: Items available for loan: Central Library (CL)Call number: 006.33 GIA (2).
Information security illuminated Michael G. Solomon, Mike Chapple

by Solomon, Michael G | Chapple, Mike.

Publisher: Boston : Jones and Bartlett, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 SOL (1).
Research methods in psychology John J. Shaughnessy, Eugene B. Zechmeister, Jeanne S. Zechmeister.

by Shaughnessy, John J | Zechmeister, Eugene B, 1944- | Zechmeister, Jeanne S.

Edition: 5th ed. Publisher: Boston MA : McGraw-Hill, c2000Online access: Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 150.72 SHA (1).
Fuzzy modeling and genetic algorithms for data mining and exploration Earl Cox.

by Cox, Earl.

Publisher: Amsterdam ; Boston : Elsevier/Morgan Kaufmann, c2005Other title: Fuzzy modeling and genetic algorithms for data mining and exploration.Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 006.312 COX (2).
Psychology : an introduction Benjamin B. Lahey.

by Lahey, Benjamin B.

Edition: 7th ed. Publisher: Boston : McGraw Hill, c2001Availability: Items available for loan: Central Library (CL)Call number: 150 LAH (1).
Automated biometrics: technologies and systems technologies and systems by David D. Zhang

by Zhang, David.

Publisher: Boston, Mass. ; London : Kluwer Academic, c2000Availability: Items available for loan: Central Library (CL)Call number: 006.4 ZHA (1).
Wireless security and privacy : best practices and design techniques Tara M. Swaminatha, Charles R. Elden ; [foreword by Gary McGraw].

by Swaminatha, Tara M | Elden, Charles R.

Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 SWA (4).
Constraint satisfaction techniques for agent-based reasoning Nicoleta Neagu.

by Neagu, Nicoleta.

Publisher: Basel ; Boston : Birkh�auser, c2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 006.3 NEA (1).
Practical neural network recipes in C++ Timothy Masters.

by Masters, Timothy.

Publisher: Boston : Academic Press, c1993Availability: Items available for loan: Central Library (CL)Call number: 006.3 MAS (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.