Limit search to available items
Nearby KDL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Year Entries
005.8 Dwi : Implementing SSH : strategies for optimizing the secure shell / Himanshu Dwivedi.; Dwivedi, Himanshu.  c2004 1
005.8 Fry : Security monitoring / Chris Fry and Martin Nystrom.; Fry, Chris.  c2009 1
005.8 Har : Mastering Web services security / Bret Hartman...[et al].  2003 1
005.8 Kee : Electronic commerce relationships : trust by design / Peter Keen ... [et al.].  2000 1
005.8 Kru : Security+ prep guide.; Krutz, Ronald L.  2003 1
005.8 Lev : Crypto : secrecy and privacy in the new code war / Steven Levy.; Levy, Steven.  c2000 1
005.8 Lin : Web site privacy with P3P / Helena Lindskog and Stefan Lindskog.; Lindskog, Helena.  2003 1
005.8 Man : Incident response & computer forensics / Chris Prosise, Kevin Mandia.; Prosise, Chris.  2003 1
005.8 Mcc : Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz.; McClure, Stuart.  1999 1
005.8 Mcn : Network security assessment / Chris McNab.; McNab, Chris  c2004 1
005.8 Men   2
005.8 Mit   2
005.8 New : Computer security : protecting digital resources / Robert C. Newman.; Newman, Robert C.  c2010 1
005.8 Oak : Java security.; Oaks, Scott.  1998 1
005.8 Ogl : Practical firewalls.; Ogletree, Terry.  2000 1
005.8 Rus : Computer security basics / Deborah Russell and G.T. Gangemi, Sr.; Russell, Deborah.  1991 1
005.8 Sca : Hacking exposed. Web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.; Scambray, Joel.  c2011 1
005.8 Sch : Building open source network security tools : components and techniques.; Schiffman, Mike D.  2002 1
005.8 Spe : The personal internet security guidebook : keeping hackers and crackers out of your home.; Speed, Tim.  2002 1
005.8 Tox : Real world Linux security : intrusion protection, detection, and recovery / Bob Toxen.; Toxen, Bob.  c2003 1
005.8 Vie : The myths of security : what the computer security industry doesn't want you to know / by John Viega.; Viega, John.  c2009 1
005.8 Wal : Engaging privacy and information technology in a digital age / James Waldo, Herbert S. Lin, and Lynette I. Millett, editors.  c2007 1
005.82 Gar : PGP : Pretty Good Privacy.; Garfinkel, Simson.  1995 1
005.82 Knu : Java cryptography.; Knudsen, Jonathan.  1998 1
005.82 Mel : Cryptography decrypted / H.X. Mel and Doris M. Baker.; Mel, H. X.,  2001 1
005.82 Sch : Cryptography and public key infrastructure on the internet / Klaus Schmeh.; Schmeh, Klaus.  c2003 1
005.84 Bow : Worm : the first digital world war / Mark Bowden.; Bowden, Mark,  c2011 1
005.84 Gri : Malicious mobile code : virus protection for Windows.; Grimes, Roger A.  2001 1
005.84 Sch : Securing the network from malicious code : a complete guide to defending against - viruses, worms and trojans / Douglas Schweitzer.; Schweitzer, Douglas.  2002 1
006.3 Big : Constructing intelligent agents using Java / Joseph P. Bigus, Jennifer Bigus.; Bigus, Joseph P.  2001 1
006.3 Bri : Building a digital human / Ken Brilliant.; Brilliant, Ken.  c2003 1
006.3 Cai : Digital human modeling : trends in human algorithms / Yang Cai (ed.).  c2008 1
006.3 Din : Understanding agent systems / Mark d'Inverno, Michael Luck.; D'Inverno, Mark.  c2004 1
006.3 Ear : Intelligent agents for mobile and virtual media / Rae Earnshaw and John Vince (eds.).  2002 1
006.3 Evo : Evolutionary computation, machine learning and data mining in bioinformatics : 8th European conference, EvoBIO 2010, Istanbul, Turkey, April 7-9, 2010, proceedings / Clara Pizzuti, Marylyn D. Ritchie, Mario Giacobini (eds.).; EvoBIO 2010  c2010 1
006.3 Hay : My mother was a computer : digital subjects and literary texts / N. Katherine Hayles.; Hayles, N. Katherine.  2005 1
006.3 Jai : Intelligent agents and their applications / Lakhmi C. Jain, Zhengxin Chen, Nikhil Ichalkaranje, editors.  c2002 1
006.3 Klu : Intelligent information agents : the AgentLink perspective / Matthias Klusch ... [et al.] (eds.).  c2003 1
006.3 Liu : Autonomous agents and multi-agent systems : explorations in learning, self-organization and adaptive computation / Jiming Liu.; Liu, Jiming.  c2001 1
006.3 Neg : Artificial intelligence : a guide to intelligent systems / Michael Negnevitsky.; Negnevitsky, Michael.  2005 1
006.3 Pep : The post-human condition.; Pepperell, Robert.  1997 1
006.3 Rut : From brows to trust : evaluating embodied conversational agents / edited by Zsofia Ruttkay and Catherine Pelachaud.  c2004 1
006.3 Shi : Turing test : verbal behavior as the hallmark of intelligence / edited by Stuart M. Shieber.  c2004 1
006.3 Sto : Layered learning in multiagent systems : a winning approach to robotic soccer.; Stone, Peter,  2000 1
006.3 Sug : Intelligent support systems : knowledge management.  c2002 1
006.3 Vaz : The role of norms and electronic institutions in multi-agent systems : the HarmonIA framework / Javier Vasquez-Salceda.; Vazquez-Salceda, Javier.  c2004 1
006.3014 Jor : Signs, search and communication : semiotic aspects of artificial intelligence / edited by Rene J. Jorna, Barend van Heusden, Roland Posner.  1993 1
006.312 Jan : Data analysis with open source tools / Philipp K. Janert.; Janert, Philipp K.  c2011 1
006.312 Rus : Mining the social web / Matthew A. Russell.; Russell, Matthew A.,  c2011 1
006.312 Tuf : Data mining et statistique decisionnelle. English; Tuffery, Stephane.  2011 1
Save marked records Save all on page
Result Page   Prev Next