UITU Library & LRC     Book GIFs | Tenor

Your search returned 5601 results.

Sort
Results
Information Theory and Coding

by Veluswamy , S.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 621.3817 GUP.

Computer Aided Design

by Singh, Dr. Sadhu.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2012Availability: Items available for loan: UITU (1)Call number: 004.2028 SIN.

ATM Networks

by Verma, Brijesh.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2013Availability: Items available for loan: UITU (1)Call number: 004.6 VER.

8051 Microcontroller & Embedded Systems

by Venkatesh K. Sampath.

Edition: 1stMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2006Availability: Items available for loan: UITU (1)Call number: 004.165 VEN.

.NET Framework with C# Programming

by Arora, L. K.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 005.133 ARO.

Securing the Cloud: cloud computer security techniques and tactics

by Winkler , Vic (J.R.).

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2011Availability: Items available for loan: UITU (1)Call number: 004.678 WIN.

Software Architecture in Practice

by Bass , Len.

Edition: 1stMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2015Availability: Items available for loan: UITU (1)Call number: 005.1 BAS.

UML @ Class Room:an introduction to object oriente modeling

by Seidle, Martina.

Edition: .NAMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 1901Availability: Items available for loan: UITU (1)Call number: 005.133 SEI.

The Cambridge Handbook of Artificial Intelligence

by Frankish, Keith.

Edition: 1stMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 6.301.

Feature Extraction & Image Processing for Computer Vision

by Nixon ,Mark S.

Edition: 3rdMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2012Availability: Items available for loan: UITU (1)Call number: 006.37 NIX.

Machine Learning

by Marsland, Stephen; Pillai ,Radhakrishnan.

Edition: 2ndMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2015Availability: Items available for loan: UITU (1)Call number: 006.3 MAR.

Computer Vision: a modern approch

by Forsyth.

Edition: 2ndMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2012Availability: Items available for loan: UITU (1)Call number: 006.37 FOR.

Database Systems: a practical approach to design, implementation and management

by Connolly , Thomas.

Edition: 4thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2013Availability: Not available: UITU: Checked out (1).

Network Security and Management

by Singh , Brijendra.

Edition: 2ndMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2009Availability: Items available for loan: UITU (1)Call number: 5.8.

Information Security Intelligence: cryptographic principles & applications

by Calabrese.

Edition: 1stMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2004Availability: Items available for loan: UITU (1)Call number: 005.8 CAL.

Security in Computing

by Pfleeger ,Charles P.

Edition: 4thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2009Availability: Items available for loan: UITU (1)Call number: 005.8 PFL.

Network Security Essentials: applications and standards

by Stallings, William.

Edition: 4thMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2011Availability: Items available for loan: UITU (1)Call number: 005.8 STA.

Applied Cryptography: protocols, algorithms, and source code in c

by Schneier, Bruice.

Edition: 2ndMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2013Availability: Items available for loan: UITU (1)Call number: 005.8 SCH.

Cloud Computing :saas, paas, laas, virtualization, business models

by Jamsa , Kris.

Edition: 1stMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2014Availability: Items available for loan: UITU (1)Call number: 004.36 JAM.

Neural Networks Learning Machines

by Haykin, Simon.

Edition: 3rdMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: 2013Availability: Items available for loan: UITU (1)Call number: 006.32 HAY.

Pages