Your search returned 3 results. Subscribe to this search

Not what you expected? Check for suggestions
|
Traceback and anonymity / Xinyuan Wang, Douglas Reeves.

by Wang, Xinyuan (Computer scientist) | Reeves, Douglas S, 1953-.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : Springer, c.2015Availability: Items available for loan: [Call number: 005.8 WAN] (1).

Log in to add tags. Add to cart
Graph-based clustering and data visualization algorithms / Ágnes Vathy-Fogarassy, Janos Abonyi.

by Vathy-Fogarassy, Ágnes | Abonyi, Janos, 1974-.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: London : Springer, c.2013Availability: Items available for loan: [Call number: 006.312 VAT] (1).

Building secure defenses against code-reuse attacks / Lucas Davi

by Davi, Lucas | Sadeghi, Ahmad-Reza [author.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York Springer, 2015Availability: Items available for loan: [Call number: 005.8 DAV] (1).

Powered by Koha