Refine your search

Your search returned 424 results.

Not what you expected? Check for suggestions
41.
Analog signal processing / by Ramon Pallas-Areny and John G. Webster

by Pallas-Areny, Ramon | Webster, John G.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : John Wiley, 2003cAvailability: Items available for loan: Call number: 621.3822 RAM-A 2003 1178 (1).

42.
Cryptology unlocked / by Reinhard Wobst Translated by Angelika Shafir

by Wobst, Reinhard.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : John Wiley Indian, 2007cAvailability: Items available for loan: Call number: 005.82 WOB-C 2007 1228 (1).

43.
Cryptography and security / by C.K Shyamala

by Shyamala, C.K | Harini, N | Padmanabhan, T.R.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : John Wiley India : 2011Availability: Items available for loan: Call number: 005.82 SHY-C 2011 1244 (2).

44.
Introduction to the theory of error correcting codes / by Vera Pless

by Pless, Vera.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New York : John wiley, 2004Availability: Items available for loan: Call number: 003.54 PLE-I 2004 1247 (1).

45.
Discrete multivariate distributions / by Norman L. Johnson, Samuel Kotz and N. Balakrishnan

by Johnson, Norman L | Kotz, Samuel | Balakrishnan, N.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : John Wiley & sons, 2004cAvailability: Items available for loan: Call number: 519.24 JOH-D 2004 1237 (1).

46.
XML 1.1 bible / by Elliotte Rusty Harold

by Harold, Elliotte Rusty.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: United States : John Wiley, 2004Availability: Items available for loan: Call number: 005.72 HAR-X 2004 191 (1).

47.
Concurrency : state models & java programming / by Jeff Magee and Jeff Kramer

by Magee, Jeff | Kramer, Jeff.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: Chichester, John Wiley & sons, 2006cAvailability: Items available for loan: Call number: 005.275 MAG-C 2006 1261 (4).

48.
Data structures and algorithms in java / by Michael T.Goodrich and Roberto Tamassia

by Goodrich, Michael T | Tamassia, Roberto.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Jersey : John Wiley, 2011cOther title: Data structures & algorithms in java /.Availability: Items available for loan: Call number: 005.133 GOD-D 2012 3604 (1).

49.
Introduction to computer theory / by Daniel I. A. Cohen

by Cohen, Daniel I. A.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : John Wiley, 2008cAvailability: Items available for loan: Call number: 004 COH-I 2008 1334 (7). Items available for reference: Not for loanCall number: 004 COH-I 2008 2627 (1).

50.
Model driven architecture : applying MDA to enterprise computing / by David S. Frankel

by Frankel, David S.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : Wiley dreamtech, 2003cAvailability: Items available for loan: Call number: 005.1 FRA-M 2003 1462 (1).

51.
Interaction design : beyond human-computer interaction / by Jenny Preece, Yvonne Rogers and Helen Sharp

by Preece, Jenny | Rogers, Yvonne | Sharp, Helen.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New York : J. Wiley & Sons, 2002Availability: Items available for loan: Call number: 004.019 PRE-J 2002 1499 (1).

52.
The wireless application procotol / by Steve Mann and Scott Sbihli

by Mann, Steve | Scott, Sbihli.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : Wiley Computer Publishing 2000.2002CAvailability: Items available for loan: Call number: 004.6 MAN-W 2002 1514 (1).

53.
Networking all in one desk reference by Doug Low.

by Lowe, Doug.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : Wiley IndiLtd.a pvt 2007Availability: Items available for loan: Call number: 004.6 LOW-N 2007 1518 (1).

54.
Defeating the hacker : a non-technical guide to computer security by Robert Schifreen.

by Schifreen, Robert.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: Chichester : John wiley And Sons Ltd. 2006Availability: Items available for loan: Call number: 005.8 SCH-D 2006 1509 (1).

55.
Network Synthesis and Filter Design / by S. O. Rajankar , R. G. Kaduskar and D. K. Shedge

by Rajankar, S. O | Kaduskar, R. G | Shedge, D. K.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : Wiley India 2010Other title: Network Synthesis & Filter Design /.Availability: Items available for loan: Call number: 621.38153 RAJ-N 2010 1505 (1).

56.
Systems analysis & design : an object - oriented approach with UML / by Alan Dennis and Barbara Haley Wixom

by Dennis, Alan | Wixom, Barbara Haley.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Jersey : John Wiley, 2002cOther title: Systems analysis and design :.Availability: Items available for loan: Call number: 004.22 DEN-S 2002 1538 (1).

57.
Mobile satellite communication networks / by Ray E. Sheriff and Y. Fun Hu

by Sheriff, Ray E | Hu, Y. Fun.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : John Wiley India, 2006Availability: Items available for loan: Call number: 621.38254 SHE-M 2006 1491 (3). Items available for reference: Not for loanCall number: 621.38254 SHE-M 2006 2385 (1).

58.
Hack attacks testings : how to conduct your own security audit / by John Chirillo

by Chirillo, John.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: London : John Wiley, 2003cAvailability: Items available for loan: Call number: 005.8 CHI-H 2003 1583 (2).

59.
Lessons learned in software testing : a context-driven approach / by Cem Kaner and James Bach

by Kaner, Cem | James Bach | Bret Pettichord.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : John Wiley India Edition, 2008cAvailability: Items available for loan: Call number: 005.14 KAN-L 2008 1606 (1).

60.
Software testing fundamentals : methods and metrics / by Marnie L. Hutcheson

by Hutcheson, Marnie L.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: New Delhi : John Wiley, 2007cAvailability: Items available for loan: Call number: 005.14 HUT-S 2007 1609 (1).

اردو کى بورڈ