Hardware security: design, threats, and safeguards Mukhopadhyay Debdeep; Chakraborty Rajat Subhra
By: Contributor(s): Material type:
TextLanguage: English Publication details: Boca Raton CRC 2015Description: xxxiii, 556p. illISBN: - 9781439895832 (hbk)
- SL01562790
- D65,8(B):(894), Q5
| Item type | Current library | Home library | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Textual
|
Central Science Library | Central Science Library | D65,8(B):(894) Q5 (Browse shelf(Opens below)) | Available | SL1562790 |
Bibliography 505-534p.; Index 535-556
There are no comments on this title.
-
6251
Selection of image processing techniques: From fundamentals to research front
by Zhang, Yu-Jin -
6252
Algorithms: A top-Down approach
by Howell, Rodney R -
6253
Analysis, cryptography and information science
-
6254
Science of deep learning
by Drori, Iddo -
6255
Algorithms: Design techniques and analysis
by Alsuwaiyel, M H -
6256
Algorithms: Design techniques and analysis
by Alsuwaiyel, M H -
6257
Algorithms: Design techniques and analysis
by Alsuwaiyel, M H -
6258
Algorithms: Design techniques and analysis
by Alsuwaiyel, M H -
6259
Algorithms: Design techniques and analysis
by Alsuwaiyel, M H -
6260
Parallel algorithms
by Alsuwaiyel, M H -
6261
Principles of artificial neural networks: Basic design to deep learning
by Graupe, Daniel -
6262
Artificial intelligence for science: A deep learning revolution
-
6263
Linear algebra tools for data mining
by Simovici, Dan A -
6264
Introduction to pattern recognition: Statistical, structural, neural and fuzzy logic approaches
by Friedman, Menahem -
6265
Understanding blockchain and crytocurrencies: A prime implementing and developing blockchain projects
by Summers, Akira -
6266
Design and analysis of cryptographic algorithms in blockchain
by Huang, Ke -
6267
Modern cryptography with froff techniques and implementations
by Hwang, Seong oun Au. -
6268
Cryptography and network security
by De Alencar, Marcelo Sampaio -
6269
Cryptography and network security: Principles and practice
by Stallings, William -
6270
Mathematics of deep learning: An Introduction
by Berlyand, Leonid -
6271
Artificial intelligence programming with python: from zero to hero
by Xiao, Perry -
6272
Multivariate analysis: An application-Oriented introduction
by Backhaus, Klaus -
6273
Introduction to machine learning with python
by Muller, Andreas C -
6274
5G NR, Wi-Fi 6, and bluetooth LE 5: A prime on smartphone wireless technologies
by Morais, Douglas H -
6275
Mobile and wireless communications with practical Use-Case scenarios
by Trestian, Ramona -
6276
Analyzing social media networks with NodeXL
by Hansen, Derek L -
6277
LTE-Advanced and next generation wireless networks
by DE Le, Roche Guillaume -
6278
Text as data: a new framework for machine learning and the social sciences
by Grimmer, Justin -
6279
Data science ethics:
by Martens, David -
6280
Tracts for computers No XV
-
6281
Studies in item analysis and prediction
by Solomon Herbert Ed. -
6282
Analysis of straight line data
by Acton Forman S -
6283
Analysing qualitative data
by Maxwell A E -
6284
Automatic reading of digits
by Bijleveld W J -
6285
Computers and education: A workshop conference at University of California, Irvine
by Gerard R W Ed. -
6286
Real - time computers: Technique and applications in the psychological sciences
by Uttal William R -
6287
University education in computing science
by Finerman Aaron Ed. -
6288
Books for school libraries
by Bruno Louis -
6289
Computer in school
by Broderick W R -
6290
Analysis of binary data
by Cox D R -
6291
Hand book of data processing for libraries
by Hayes Robert M -
6292
Way things work book of the computer: An illustrated encylopedia of information science, cybernetics and data processing
-
6293
Use and misuse of computer in education
by Ellis Allan B -
6294
Job control language
by Ashley Ruth -
6295
ANS Cobol
by Ashley Ruth -
6296
Analysis of data: Introductory statstics for the behavioral sciences
by Senter R J -
6297
Computing systems fundamentals techniques
-
6298
Fundamentals of numerical control
by Vlahos Charles -
6299
Executive's guide to computer concepts
by Monsma James E -
6300
Digital computer programming
by Stark Peter R
Hardware security: design, threats, and safeguards
APA
Mukhopadhyay Debdeep; Chakraborty Rajat Subhra, Mukhopadhyay Debdeep; Chakraborty Rajat Subhra, . (2015). Hardware security: design, threats, and safeguards. Boca: Raton CRC.
Chicago
Mukhopadhyay Debdeep; Chakraborty Rajat Subhra, Mukhopadhyay Debdeep; Chakraborty Rajat Subhra, . 2015. Hardware security: design, threats, and safeguards. Boca: Raton CRC.
Harvard
Mukhopadhyay Debdeep; Chakraborty Rajat Subhra, Mukhopadhyay Debdeep; Chakraborty Rajat Subhra, . (2015). Hardware security: design, threats, and safeguards. Boca: Raton CRC.
MLA
Mukhopadhyay Debdeep; Chakraborty Rajat Subhra, Mukhopadhyay Debdeep; Chakraborty Rajat Subhra, . Hardware security: design, threats, and safeguards. Boca: Raton CRC. 2015.
