Limit search to available items
Nearby BJL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Media Year
QA 76.87 S6 : Building neural networks.; BJL     
      Building neural networks. BJL  BOOK 1996
QA 76.87 T1 : A guide to neural computing applications.; BJL     
      A guide to neural computing applications. BJL  BOOK 1998
QA 76.87 W5 : Artificial neural networks : approximation and learning theory.; BJL     
      Artificial neural networks : approximation and learning theory. BJL  BOOK 1992
QA 76.88 H6    
      High-performance computing and networking : international conference and exhibition, Vienna, Austria, BJL  BOOK 1997
      High-performance computing and networking : international conference and exhibition, HPCN EUROPE 1966 BJL  BOOK 1996
QA 76.88 S6 : The software optimization cookbook : high performance recipes for IA-32 platforms / Richard Gerber ... [et al.]; BJL     
      The software optimization cookbook : high performance recipes for IA-32 platforms / Richard Gerber .. BJL  BOOK 2006
QA76.889 : Quantum information processing (Online); Online materials     
      Quantum information processing [electronic resource]. Online materials  EJOURNALS 2002-
QA 76.889 B4 : Principles of quantum computation and information. Volume I : Basic concepts / Giuliano Benenti and Giulio Casati, Giuliano Strini.; BJL     
      Principles of quantum computation and information. Volume I : Basic concepts / Giuliano Benenti and G BJL  BOOK c2004
QA 76.889 I6 : Introduction to quantum computation and information / editors, Hoi-Kwong Lo, Tim Spiller, Sandu Popescu.; BJL     
      Introduction to quantum computation and information / editors, Hoi-Kwong Lo, Tim Spiller, Sandu Popes BJL  BOOK 1998
QA 76.889 N6 : Quantum computation and quantum information / Michael A. Nielsen and Isaac L. Chuang.; BJL, Departmental Locations      
      Quantum computation and quantum information / Michael A. Nielsen and Isaac L. Chuang. BJL, Departmental Locations   BOOK 2000
QA 76.889 P5 : The physics of quantum information : quantum cryptography, quantum teleportation, quantum computation / Dirk Bouwmeester, Artur K. Ekert, Anton Zeilinger (eds.).; BJL     
      The physics of quantum information : quantum cryptography, quantum teleportation, quantum computation BJL  BOOK 2000
QA 76.889 Q1 : Quantum computing and communications / Michael Brooks, editor.; BJL     
      Quantum computing and communications / Michael Brooks, editor. BJL  BOOK 1999
QA 76.889 R5 : Quantum computing : a gentle introduction / Eleanor Rieffel and Wolfgang Polak.; BJL     
      Quantum computing : a gentle introduction / Eleanor Rieffel and Wolfgang Polak. BJL  BOOK c2011
QA 76.889 Y2 : Quantum computing for computer scientists / Noson S. Yanofsky and Mirco A. Mannucci.; BJL     
      Quantum computing for computer scientists / Noson S. Yanofsky and Mirco A. Mannucci. BJL  BOOK 2008
QA 76.89 C9 : Developing Tablet PC applications.; BJL     
      Developing Tablet PC applications. BJL  BOOK c2004
QA 76.89 J3 : Building Tablet PC applications / Rob Jarrett, Philip Su.; BJL     
      Building Tablet PC applications / Rob Jarrett, Philip Su. BJL  BOOK 2003
QA 76.9 A23 H3    
      Abstract data types in Modula-2. BJL  BOOK 1989
      Abstract data types in standard ML. BJL  BOOK 1993
QA 76.9 A23 R2    
      Recent trends in data type specification : 7th Workshop on specification of abstract data types, Wust BJL  BOOK 1991
      Recent trends in data type specifications : 5th workshop on specification of Abstract Data Types, Gul BJL  BOOK 1988
QA 76.9 A23 T4 : Abstract data types : their specification representation, and use / P. Thomas, H. Robinson and J. Emms.; BJL     
      Abstract data types : their specification representation, and use / P. Thomas, H. Robinson and J. Emm BJL  BOOK 1988
QA76.9.A25    
      Computers & security [electronic resource]. Online materials  EJOURNALS 1982-
      Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, V BJL  BOOK c2011
      I-ways [electronic resource]. Online materials  EJOURNALS  
QA 76.9 A25 A1    
      Access denied : the practice and policy of global internet filtering / edited by Ronald Deibert ... [ BJL  BOOK c2008
      Proceedings of Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002, June 3-4 BJL  BOOK 2002
QA 76.9 A25 A5 : Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.; BJL     
      Security engineering : a guide to building dependable distributed systems / Ross J. Anderson. BJL  BOOK c2008
QA 76.9 A25 B3 : Designing information systems security.; BJL     
      Designing information systems security. BJL  BOOK 1988
QA 76.9 A25 B5 : Best truth : intelligence in the Information Age / Bruce D. Berkowitz and Allan E. Goodman.; BJL     
      Best truth : intelligence in the Information Age / Bruce D. Berkowitz and Allan E. Goodman. BJL  BOOK c2000
QA 76.9 A25 B7 : Codes, ciphers, and computers : an introduction to information security.; BJL     
      Codes, ciphers, and computers : an introduction to information security. BJL  BOOK 1982
QA 76.9 A25 B8    
      Data protection : specification for a personal information management system. BJL  BOOK 2009
      Evidential weight and legal admissibility of electronic information : specification. BJL  BOOK 2008
      Information security management. Part 2 : Specification for information security management systems. BJL  BOOK 1999
      Information security management systems : part 3 guidelines for information security risk management. BJL  BOOK 2006
3 additional entries    
QA 76.9 A25 B9 : Information and secrecy : Vannevar Bush, Ultra, and the other Memex.; BJL     
      Information and secrecy : Vannevar Bush, Ultra, and the other Memex. BJL  BOOK 1994
QA 76.9 A25 C1 : Information security handbook / William Caelli, Dennis Longley, Michael Shain.; BJL     
      Information security handbook / William Caelli, Dennis Longley, Michael Shain. BJL  BOOK 1991
QA 76.9 A25 C6    
      Computer fraud / by P.A. Collier, R. Dixon, C.L. Marston. BJL  BOOK 1990
      The prevention and detection of computer fraud / P.A. Collier, R. Dixon, C.L. Marston. BJL  BOOK 1990
QA 76.9 A25 C65 / q : Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteenth Colloquy on European Law, Lisbon, 26-28 September, 1984.; BJL     
      Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteent BJL  BOOK 1985
QA76.9.A25 C8225 : Cryptography and communications (Online); Online materials     
      Cryptography and communications [electronic resource] : discrete structures, Boolean functions and se Online materials  EJOURNALS 2009-
QA 76.9 A25 C9 : Current security management & ethical issues of information technology / edited by Rasool Azari.; BJL     
      Current security management & ethical issues of information technology / edited by Rasool Azari. BJL  BOOK c2003
QA76.9.A25 D5 2018 : Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team tactics / Yuri Diogenes, Erdal Ozkaya.; BJL     
      Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team t BJL  BOOK 2018
QA76.9.A25 D8 2017 : Computer security : a hands-on approach / Wenliang Du.; BJL     
      Computer security : a hands-on approach / Wenliang Du. BJL  BOOK 2017
QA76.9.A25 E5425 2007 : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.; BJL     
      Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynet BJL  BOOK c2007
QA 76.9 A25 E6 : Hacking : the art of exploitation / Jon Erickson.; BJL     
      Hacking : the art of exploitation / Jon Erickson. BJL  BOOK 2007
QA 76.9 A25 F3 : Cryptography engineering : design principles and practical applications.; BJL     
      Cryptography engineering : design principles and practical applications. BJL  BOOK 2010
QA 76.9 A25 G6 : Computer security / Dieter Gollmann.; BJL     
      Computer security / Dieter Gollmann. BJL  BOOK 2011
QA 76.9 A25 G7 : Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].; BJL     
      Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.]. BJL  BOOK c2008
QA 76.9 A25 H1 : Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.; BJL     
      Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff. BJL  BOOK 1993
QA 76.9 A25 H8 : Writing secure code / Michael Howard and David LeBlanc.; BJL     
      Writing secure code / Michael Howard and David LeBlanc. BJL  BOOK 2003
QA 76.9 A25 H9 : Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Matt Warren.; BJL     
      Information warfare : corporate attack and defence in a digital world / Bill Hutchinson, Matt Warren. BJL  BOOK 2001
QA76.9.A25 I347 : IEEE security & privacy (Online); Online materials     
      IEEE security & privacy [electronic resource]. Online materials  EJOURNALS  
QA76.9.A25 I54155    
      Information security technical report [electronic resource]. Online materials  EJOURNALS 2013
      Journal of information security and applications [electronic resource]. Online materials  EJOURNALS  
QA 76.9 A25 I6    
      IEE proceedings : information security. BJL  PERIODICAL 2006
      Information security handbook. BJL  BOOK 1993
QA 76.9 A25 K2 : Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.; BJL     
      Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell. BJL  BOOK c2008
QA76.9.A25 K536 2014 : Fundamentals of information systems security / David Kim and Michael G. Solomon.; BJL     
      Fundamentals of information systems security / David Kim and Michael G. Solomon. BJL  BOOK c2014
QA 76.9 A25 K8 : The crypto controversy : a key conflict in the Information Society.; BJL     
      The crypto controversy : a key conflict in the Information Society. BJL  BOOK 1999
QA76.9.A25 L49 2001 : Crypto : secrecy and privacy in the new code war / Steven Levy.; BJL     
      Crypto : secrecy and privacy in the new code war / Steven Levy. BJL  BOOK c2000
QA 76.9 A25 L8    
      Big book of IPsec RFCs / compiled by Pete Loshin. BJL  BOOK 2000
      Data and computer security : dictionary of standards concepts and terms / Dennis Longley, Michael Sha BJL  BOOK 1989
QA 76.9 A25 M1 : Software security : building security in.; BJL     
      Software security : building security in. BJL  BOOK c2006
Save marked records Save all on page
Result Page   Prev Next