Limit search to available items
Nearby BJL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Year Entries
QA 76.87 L6 : Artificial life : the quest for a new creation.; BJL  1993 1
QA 76.87 M4   2
QA 76.87 N4   2
QA 76.87 P6 : Introduction to neural networks.; BJL  1994 1
QA 76.87 R5 : Pattern recognition and neural networks.; BJL  1996 1
QA 76.87 R6 : Neural computation and self-organizing maps : an introduction / Helge Ritter, Thomas Martinetz, Klaus Schulten ; translated by Daniel Barsky, Marcus Tesch, and Ronald Kates.; BJL  1992 1
QA 76.87 S2 : Artificial neural networks.; BJL  1997 1
QA 76.87 S6 : Building neural networks.; BJL  1996 1
QA 76.87 T1 : A guide to neural computing applications.; BJL  1998 1
QA 76.87 W5 : Artificial neural networks : approximation and learning theory.; BJL  1992 1
QA 76.88 H6   2
QA 76.88 S6 : The software optimization cookbook : high performance recipes for IA-32 platforms / Richard Gerber ... [et al.]; BJL  2006 1
QA 76.889 B4 : Principles of quantum computation and information. Volume I : Basic concepts / Giuliano Benenti and Giulio Casati, Giuliano Strini.; BJL  c2004 1
QA 76.889 I6 : Introduction to quantum computation and information / editors, Hoi-Kwong Lo, Tim Spiller, Sandu Popescu.; BJL  1998 1
QA 76.889 N6 : Quantum computation and quantum information / Michael A. Nielsen and Isaac L. Chuang.; BJL, Departmental Locations   2000 1
QA 76.889 P5 : The physics of quantum information : quantum cryptography, quantum teleportation, quantum computation / Dirk Bouwmeester, Artur K. Ekert, Anton Zeilinger (eds.).; BJL  2000 1
QA 76.889 Q1 : Quantum computing and communications / Michael Brooks, editor.; BJL  1999 1
QA 76.889 R5 : Quantum computing : a gentle introduction / Eleanor Rieffel and Wolfgang Polak.; BJL  c2011 1
QA 76.889 Y2 : Quantum computing for computer scientists / Noson S. Yanofsky and Mirco A. Mannucci.; BJL  2008 1
QA 76.89 C9 : Developing Tablet PC applications.; BJL  c2004 1
QA 76.89 J3 : Building Tablet PC applications / Rob Jarrett, Philip Su.; BJL  2003 1
QA 76.9 A23 H3   2
QA 76.9 A23 R2   2
QA 76.9 A23 T4 : Abstract data types : their specification representation, and use / P. Thomas, H. Robinson and J. Emms.; BJL  1988 1
QA76.9.A25 : Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.; BJL  c2011 1
QA 76.9 A25 A1   2
QA 76.9 A25 A5 : Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.; BJL  c2008 1
QA 76.9 A25 B3 : Designing information systems security.; BJL  1988 1
QA 76.9 A25 B5 : Best truth : intelligence in the Information Age / Bruce D. Berkowitz and Allan E. Goodman.; BJL  c2000 1
QA 76.9 A25 B7 : Codes, ciphers, and computers : an introduction to information security.; BJL  1982 1
QA 76.9 A25 B8   7
QA 76.9 A25 B9 : Information and secrecy : Vannevar Bush, Ultra, and the other Memex.; BJL  1994 1
QA 76.9 A25 C1 : Information security handbook / William Caelli, Dennis Longley, Michael Shain.; BJL  1991 1
QA 76.9 A25 C6   2
QA 76.9 A25 C65 / q : Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteenth Colloquy on European Law, Lisbon, 26-28 September, 1984.; BJL  1985 1
QA 76.9 A25 C9 : Current security management & ethical issues of information technology / edited by Rasool Azari.; BJL  c2003 1
QA76.9.A25 D5 2018 : Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team tactics / Yuri Diogenes, Erdal Ozkaya.; BJL  2018 1
QA76.9.A25 D8 2017 : Computer security : a hands-on approach / Wenliang Du.; BJL  2017 1
QA76.9.A25 E5425 2007 : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.; BJL  c2007 1
QA 76.9 A25 E6 : Hacking : the art of exploitation / Jon Erickson.; BJL  2007 1
QA 76.9 A25 F3 : Cryptography engineering : design principles and practical applications.; BJL  2010 1
QA 76.9 A25 G6 : Computer security / Dieter Gollmann.; BJL  2011 1
QA 76.9 A25 G7 : Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].; BJL  c2008 1
QA 76.9 A25 H1 : Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.; BJL  1993 1
QA 76.9 A25 H8 : Writing secure code / Michael Howard and David LeBlanc.; BJL  2003 1
QA 76.9 A25 H9 : Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Matt Warren.; BJL  2001 1
QA 76.9 A25 I6   2
QA 76.9 A25 K2 : Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.; BJL  c2008 1
QA76.9.A25 K536 2014 : Fundamentals of information systems security / David Kim and Michael G. Solomon.; BJL  c2014 1
QA 76.9 A25 K8 : The crypto controversy : a key conflict in the Information Society.; BJL  1999 1
Save marked records Save all on page
Result Page   Prev Next