Your search returned 13 results.

Not what you expected? Check for suggestions
Introduction to data mining Pang-Ning Tan, Michael Steinbach, Vipin Kumar.

by Tan, Pang-Ning | Steinbach, Michael | Kumar, Vipin, 1956-.

Edition: 1st ed. Publisher: Boston : Pearson Addison Wesley, C.(2006 from Acc # 9511 to 9513) , (2015 from Acc # 13373 to 13376) 2006Availability: Items available for loan: Central Library (CL)Call number: 006.3 TAN (6). Checked out (1).
The CERT guide to system and network security practices Julia H. Allen.

by Allen, Julia H.

Publisher: Boston, MA ; Singapore : Addison-Wesley, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 ALL (1).
Information warfare and security Dorothy E. Denning.

by Denning, Dorothy Elizabeth Robling.

Publisher: India : Reading, Ma. : ACM Press ; Addison-Wesley, c1999Availability: Items available for loan: Central Library (CL)Call number: 005.8 DEN (1).
.NET framework security Brian A. LaMacchia

by LaMacchia, Brian A.

Publisher: Boston : Addison-Wesley, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.8 LAM (1).
Multimedia interface design edited by Meera M. Blattner, Roger B. Dannenberg.

by Blattner, Meera M | Dannenberg, Roger B.

Publisher: New York, N.Y. : Reading, Mass. : ACM Press ; Addison-Wesley Pub., c1992Availability: Items available for loan: Central Library (CL)Call number: 006 BLA (1).
Artificial intelligence : structures and strategies for complex problem solving George F. Luger, William A Stubblefield.

by Luger, George F | Stubblefield, William A.

Edition: 3rd ed. Publisher: Harlow, England ; Reading, Mass. : Addison-Wesley, c1998Availability: Items available for loan: Central Library (CL)Call number: 006.13 LUG (1).
Simulating neural networks with Mathematica James A. Freeman

by Freeman, James A.

Publisher: Reading, Mass. : Addison-Wesley, cop. 1993Availability: Items available for loan: Central Library (CL)Call number: 006.3 FRE (1).
Wireless security and privacy : best practices and design techniques Tara M. Swaminatha, Charles R. Elden ; [foreword by Gary McGraw].

by Swaminatha, Tara M | Elden, Charles R.

Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 SWA (4).
Artificial intelligence Patrick Henry Winston.

by Winston, Patrick Henry.

Edition: 3rd ed. Publisher: Reading, Mass. : Addison-Wesley Pub. Co., c1992Availability: Items available for loan: Central Library (CL)Call number: 006.3 WIN (2).
Web security: a step-by-step reference guide a step-by-step reference guide Lincoln D. Stein.

by Stein, Lincoln D.

Publisher: Reading, Mass. : Addison-Wesley, c1998Availability: Items available for loan: Central Library (CL)Call number: 005.8 STE (1).
Data mining : a tutorial-based primer Richard J. Roiger, Michael W. Geatz.

by Roiger, Richard | Geatz, Michael.

Publisher: Boston : Addison Wesley, c2003Availability: Items available for loan: Central Library (CL)Call number: 006.3 ROI (1).
High-tech crimes revealed : cyberwar stories from the digital front Steven Branigan.

by Branigan, Steven.

Publisher: Boston, MA : Addison-Wesley, c2005Other title: Cyberwar stories from the digital front..Availability: Items available for loan: Central Library (CL)Call number: 005.8 BRA (3).
Software security engineering : a guide for project managers

by Allen, Julia H | Julia H. Allen.

Material type: Text Text Publisher: New York Addison Wesley 2008Availability: Items available for loan: Central Library (CL)Call number: 005.8 ALL (1).
© 2021 Central Library, National University of Sciences and Technology. All Rights Reserved.