Refine your search

Your search returned 7608 results.

Sort
Results
21.
UNIX network programming by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI, c1990
Availability: Items available for loan: IIITD (2)Call number: 005.43 STE-U, ...

22.
UNIX network programming : Interprocess communications, vol II by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, ©1999
Availability: Items available for loan: IIITD (2)Call number: 005.43 STE-U, ...

23.
Neural networks : algorithms, applications, and programming techniques by Series: Computation and neural systems series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©1991
Availability: Items available for loan: IIITD (2)Call number: 006.3 FRE-N, ...

24.
Neural networks in computer intelligence by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, ©1994
Availability: Items available for loan: IIITD (1)Call number: 006.3 FU-N.

25.
Neural networks : a classroom approach by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: TMH, 2010
Availability: Items available for loan: IIITD (1)Call number: 006.32 KUM-N.

26.
Wireless networking by Series: The Morgan Kaufmann series in networking
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Morgan Kaufmann, c2008
Availability: Items available for loan: IIITD (2)Call number: REF 621.384 KUM-W, ...

27.
Weakly connected neural networks by Series: Applied mathematical sciences (Springer-Verlag New York Inc.) ; v. 126.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, c1997
Availability: Items available for loan: IIITD (1)Call number: REF 006.32 HOP-W.

28.
Data and computer communications by
Edition: 8th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2007
Availability: Items available for loan: IIITD (2)Call number: 004.6 STA-D, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 004.6 STA-D.

29.
Interconnection networks : an engineering approach by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Morgan Kaufmann, 2003
Availability: Items available for loan: IIITD (2)Call number: 004.6 DUA-I, ...

30.
Digital business security development : management technologies by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : Business Science Reference, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KER-D.

31.
Ad hoc and sensor networks : theory and applications by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Cambridge University Press, ©2011
Availability: Items available for loan: IIITD (2)Call number: REF 621.3821 COR-A, ...

32.
Network security : private communication in a public world by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI, c2002
Availability: Items available for loan: IIITD (3)Call number: 005.8 KAU-N, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAU-N. Not available: IIITD: Checked out (1).

33.
Cryptography and network security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 FOR-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 FOR-C. Not available: IIITD: Checked out (1).

34.
Principles and applications of distributed event-based systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : Information Science Reference, c2010
Availability: Items available for loan: IIITD (1)Call number: REF 004.36 HIN-P.

35.
Embedded java security : security for mobile devices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Springer, ©2007
Availability: Items available for loan: IIITD (1)Call number: 005.8 DEB-E.

36.
Bayesian artificial intelligence by Series: Chapman & Hall/CRC computer science and data analysis series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 006.3 KOR-B.

37.
New directions in statistical signal processing : from systems to brain by Series: Neural information processing series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI Learning, c2007
Availability: Items available for loan: IIITD (1)Call number: 612.8 SIM-N.

38.
A multidisciplinary introduction to information security by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 MJO-M.

39.
Introduction to security and network forensics by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BUC-I.

40.
Low power networks-on-chip by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 621.38 SIL-L.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in