Your search returned 254 results.

Sort
Results
121.
Linux networking cookbook by Carla Schroder by
Publication details: Farnham O'Reilly 2007
Availability: Not available: IMAR: Checked out (1).

122.
Cisco IOS cookbook Kevin Dooley and Ian J. Brown by
Edition: 2nd ed. (revised and updated)
Publication details: Beijing Sebastopol, CA O'Reilly c2007
Availability: Not available: IMAR: Checked out (1).

123.
Sendmail Bryan Costales; Jansen, George; Assman, Claus with Sapiro, Gregory Neil by
Edition: 4th ed., rev. & updated
Publication details: Beijing Sebastopol O'Reilly c2008
Availability: Not available: IMAR: Checked out (1).

124.
LDAP system administration Gerald Carter by
Edition: 1st ed
Publication details: Beijing Sebastopol, CA O'Reilly c2003
Availability: Not available: IMAR: Checked out (1).

125.
Security warrior Cyrus Peikari and Anton Chuvakin by
Edition: 1st ed
Publication details: Beijing Sebastopol, CA O'Reilly c2004
Availability: Not available: IMAR: Checked out (1).

126.
Screenos cookbook [by] Stefan Brunner ... [et al.] by
Edition: 1st ed
Publication details: Sebastopol, CA O'Reilly Media c2008
Availability: Not available: IMAR: Checked out (1).

127.
Network warrior Gary A. Donahue by
Edition: 1st ed
Publication details: Beijing Sebastopol, CA O'Reilly Media 2007
Availability: Not available: IMAR: Checked out (1).

128.
Surface treatment V computer methods and experimental measurements edited by C.A. Brebbia by Series: Computational and experimental methods ; v. 6
Publication details: Southampton WIT Press 2001
Other title:
  • Surface treatment 5
Availability: Items available for loan: IMAR (1)Call number: II 36499.

129.
Modelling of metal forming processes proceedings of the Euromech 233 Colloquium, Sophia Antipolis, France, August 29-31, 1988 edited by J.L. Chenot and E. Onate by
Publication details: Dordrecht Boston Norwell, MA, U.S.A Kluwer Academic Publishers Sold and distributed in the U.S.A. and Canada by Kluwer Academic Publishers c1988
Availability: Items available for loan: IMAR (1)Call number: II 36470.

130.
Memory, attention, and decision-making: A unifying computational neuroscience approach Edmund T. Rolls by
Publication details: Oxford New York Oxford University Press 2008
Availability: Not available: IMAR: Checked out (1).

131.
132.
Lectures in game theory for computer scientists edited by Krzysztof R. Apt, Erich Gradel by
Publication details: Cambridge New York Cambridge University Press 2011
Availability: Not available: IMAR: Checked out (1).

133.
Design of survivable networks Mechthild Stoer by Series: Lecture notes in mathematics (Springer-Verlag)
Publication details: Berlin New York Springer-Verlag c1992
Availability: Items available for loan: IMAR (1)Call number: 519.7-STO.

134.
135.
Complexity theory and cryptology: An introduction to cryptocomplexity by
Series: Texts in theoretical computer science | Texts in theoretical computer science
Publication details: Berlin New York Springer 2005
Availability: Not available: IMAR: Checked out (1).

136.
Understanding and applying cryptography and data security Adam J. Elbirt by
Publication details: Boca Raton, Fl CRC Press 2009
Online resources:
Availability: Not available: IMAR: Checked out (1).

137.
A classical introduction to cryptography: by Thomas Baigneres et al Exercise Book by
Publication details: New York Springer c2006
Availability: Not available: IMAR: Checked out (1).

138.
Cryptography decrypted H.X. Mel, Doris Baker ; map appendix by Steve Burnett ; foreword by John Kinyon by
Publication details: Boston, MA Addison-Wesley 2001
Availability: Not available: IMAR: Checked out (1).

139.
Malicious cryptography: Exposing cryptovirology Adam Young, Moti Yung by
Publication details: Hoboken, NJ Wiley c2004
Availability: Not available: IMAR: Checked out (1).

140.
Applied cryptography: Protocols, algorithms, and source code in C Bruce Schneier by
Edition: 2nd ed
Publication details: New York Wiley c1996
Availability: Not available: IMAR: Checked out (1).

Pages

Powered by Koha