QA 76.87 P6 : Introduction to neural networks.; BJL
1994
1
QA 76.87 R5 : Pattern recognition and neural networks.; BJL
1996
1
QA 76.87 R6 : Neural computation and self-organizing maps : an introduction / Helge Ritter, Thomas Martinetz, Klaus Schulten ; translated by Daniel Barsky, Marcus Tesch, and Ronald Kates.; BJL
QA 76.88 S6 : The software optimization cookbook : high performance recipes for IA-32 platforms / Richard Gerber ... [et al.]; BJL
2006
1
QA 76.889 B4 : Principles of quantum computation and information. Volume I : Basic concepts / Giuliano Benenti and Giulio Casati, Giuliano Strini.; BJL
c2004
1
QA 76.889 I6 : Introduction to quantum computation and information / editors, Hoi-Kwong Lo, Tim Spiller, Sandu Popescu.; BJL
1998
1
QA 76.889 N6 : Quantum computation and quantum information / Michael A. Nielsen and Isaac L. Chuang.;
BJL, Departmental Locations
2000
1
QA 76.889 P5 : The physics of quantum information : quantum cryptography, quantum teleportation, quantum computation / Dirk Bouwmeester, Artur K. Ekert, Anton Zeilinger (eds.).; BJL
2000
1
QA 76.889 Q1 : Quantum computing and communications / Michael Brooks, editor.; BJL
1999
1
QA 76.889 R5 : Quantum computing : a gentle introduction / Eleanor Rieffel and Wolfgang Polak.; BJL
c2011
1
QA 76.889 Y2 : Quantum computing for computer scientists / Noson S. Yanofsky and Mirco A. Mannucci.; BJL
2008
1
QA 76.89 C9 : Developing Tablet PC applications.; BJL
c2004
1
QA 76.89 J3 : Building Tablet PC applications / Rob Jarrett, Philip Su.; BJL
QA 76.9 A25 C65 / q : Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteenth Colloquy on European Law, Lisbon, 26-28 September, 1984.; BJL
1985
1
QA 76.9 A25 C9 : Current security management & ethical issues of information technology / edited by Rasool Azari.; BJL
c2003
1
QA76.9.A25 D5 2018 : Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team tactics / Yuri Diogenes, Erdal Ozkaya.; BJL
QA76.9.A25 E5425 2007 : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.; BJL
c2007
1
QA 76.9 A25 E6 : Hacking : the art of exploitation / Jon Erickson.; BJL