QA 76.889 B4 : Principles of quantum computation and information. Volume I : Basic concepts / Giuliano Benenti and Giulio Casati, Giuliano Strini.; BJL
Principles of quantum computation and information. Volume I : Basic concepts / Giuliano Benenti and G
BJL
BOOK
c2004
QA 76.889 I6 : Introduction to quantum computation and information / editors, Hoi-Kwong Lo, Tim Spiller, Sandu Popescu.; BJL
Introduction to quantum computation and information / editors, Hoi-Kwong Lo, Tim Spiller, Sandu Popes
BJL
BOOK
1998
QA 76.889 N6 : Quantum computation and quantum information / Michael A. Nielsen and Isaac L. Chuang.;
BJL, Departmental Locations
Quantum computation and quantum information / Michael A. Nielsen and Isaac L. Chuang.
BJL, Departmental Locations
BOOK
2000
QA 76.889 P5 : The physics of quantum information : quantum cryptography, quantum teleportation, quantum computation / Dirk Bouwmeester, Artur K. Ekert, Anton Zeilinger (eds.).; BJL
The physics of quantum information : quantum cryptography, quantum teleportation, quantum computation
BJL
BOOK
2000
QA 76.889 Q1 : Quantum computing and communications / Michael Brooks, editor.; BJL
Quantum computing and communications / Michael Brooks, editor.
BJL
BOOK
1999
QA 76.889 R5 : Quantum computing : a gentle introduction / Eleanor Rieffel and Wolfgang Polak.; BJL
Quantum computing : a gentle introduction / Eleanor Rieffel and Wolfgang Polak.
BJL
BOOK
c2011
QA 76.889 Y2 : Quantum computing for computer scientists / Noson S. Yanofsky and Mirco A. Mannucci.; BJL
Quantum computing for computer scientists / Noson S. Yanofsky and Mirco A. Mannucci.
BJL
BOOK
2008
QA 76.89 C9 : Developing Tablet PC applications.; BJL
Developing Tablet PC applications.
BJL
BOOK
c2004
QA 76.89 J3 : Building Tablet PC applications / Rob Jarrett, Philip Su.; BJL
Building Tablet PC applications / Rob Jarrett, Philip Su.
BJL
Computer fraud / by P.A. Collier, R. Dixon, C.L. Marston.
BJL
BOOK
1990
The prevention and detection of computer fraud / P.A. Collier, R. Dixon, C.L. Marston.
BJL
BOOK
1990
QA 76.9 A25 C65 / q : Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteenth Colloquy on European Law, Lisbon, 26-28 September, 1984.; BJL
Beyond 1984 : the law and information technology in tomorrow's society : proceedings of the fourteent
BJL
BOOK
1985
QA 76.9 A25 C9 : Current security management & ethical issues of information technology / edited by Rasool Azari.; BJL
Current security management & ethical issues of information technology / edited by Rasool Azari.
BJL
BOOK
c2003
QA76.9.A25 D5 2018 : Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team tactics / Yuri Diogenes, Erdal Ozkaya.; BJL
Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team t
BJL
Computer security : a hands-on approach / Wenliang Du.
BJL
BOOK
2017
QA76.9.A25 E5425 2007 : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.; BJL
Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynet
BJL
BOOK
c2007
QA 76.9 A25 E6 : Hacking : the art of exploitation / Jon Erickson.; BJL
Hacking : the art of exploitation / Jon Erickson.
BJL
QA 76.9 A25 M5 : Cryptography decrypted / H.X. Mel, Doris M. Baker ; math appendix by Steve Burnett ; foreword by John Kinyon.; BJL
Cryptography decrypted / H.X. Mel, Doris M. Baker ; math appendix by Steve Burnett ; foreword by John
BJL
BOOK
2001
QA 76.9 A25 M6 : The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon ; foreword by Steve Wozniak.; BJL
The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simo
BJL
New Security Paradigms Workshop, September 10th-13th, 2001, Cloudcroft, N.M. : proceedings.
BJL
BOOK
2001
New Security Paradigms Workshop, September 22-25, 1998, Charlottsville, Va. : proceedings.
BJL
BOOK
1999
New Security Paradigms Workshop, September 23-26, 1997, Langdale, Cumbria : proceedings.
BJL
BOOK
1998
QA 76.9 A25 P3 : Information security risk analysis / Thomas R. Peltier.; BJL
Information security risk analysis / Thomas R. Peltier.
BJL
BOOK
c2001
QA76.9.A25 P33 2010 : Understanding cryptography [electronic resource] : a textbook for students and practitioners / Christof Paar, Jan Pelzl ; foreword by Bart Preneel.; Online materials
Understanding cryptography [electronic resource] : a textbook for students and practitioners / Christ
Online materials
EBOOKS
2010
QA 76.9 A25 P9 : The protection of computer software : its technology and applications / edited by D. Grover.; BJL
The protection of computer software : its technology and applications / edited by D. Grover.
BJL