Signal detection and estimation / (Record no. 175732)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02048 a2200253 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | Nust |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220817112733.0 |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2005048031 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1580530702 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | Nust |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 621.3822,BAR |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Barkat, Mourad. |
| 9 (RLIN) | 62143 |
| 245 10 - TITLE STATEMENT | |
| Title | Signal detection and estimation / |
| Statement of responsibility, etc. | Mourad Barkat. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 2nd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boston : |
| Name of publisher, distributor, etc. | Artech House, |
| Date of publication, distribution, etc. | c2005. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvii, 692 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. + |
| Accompanying material | 1 CD-ROM (4 3/4 in.) |
| 440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE | |
| Title | Artech House radar library |
| 9 (RLIN) | 28729 |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | A protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190), Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security (Page-301), Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Estimation theory. |
| 9 (RLIN) | 10694 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Radar. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Stochastic processes. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Telecommunication Engineering |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Reference |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Date acquired | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | Reference | 12/12/2016 | 621.3822,BAR | MCS32474 | 12/08/2016 | 12/12/2016 | Reference | Almirah No.22, Shelf No.3 |
