Search | Darden Library | TinyCat | collectionid: 564591
2024-05-01 2:04 pm
Toggle Dropdown
Advanced Search
Darden Library
531 items
1
2
3
4
5
...
10
11
relevancy
Sort
relevancy
acquisition
title
date
author
popularity
series
531 items
5
531 items found
Sort
relevancy
acquisition
title
date
author
popularity
series
Hash Crack: Password Cracking Manual (v3)
by
Joshua Picolet
Paperback, 2019
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.83
Ask About This
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
by
Mike Schiffman
Other, 2001
Collections
Main Stacks
,
Your library
Series
Hacker's challenge (1)
Status
Available
Call number
005
Ask About This
Prime numbers : a computational perspective
by
Richard E. Crandall
Paper Book, 2001
Collections
Main Stacks
,
Your library
Status
Available
Call number
512/.72
Ask About This
Logicomix : [an epic search for truth]
by
Apostolos K. Doxiadēs
Paper Book, 2009
Collections
Main Stacks
,
Your library
Status
Available
Call number
192
Ask About This
The Radio Amateur Antenna Handbook
by
William I. Orr
Other, 1990
Collections
Main Stacks
,
Your library
Status
Available
Call number
621.384135
Ask About This
Science fiction : a historical anthology
by
Eric S. Rabkin
Paper Book, 1983
Collections
Main Stacks
,
Your library
Status
Available
Call number
808.83/876
Ask About This
Network security hacks
by
Andrew Lockhart
Paper Book, 2004
Collections
Main Stacks
,
Your library
Series
Hacks
Status
Available
Call number
005.8
Ask About This
Exploiting software : how to break code
by
Greg Hoglund
Paper Book, 2004
Collections
Main Stacks
,
Your library
Series
Addison-Wesley Software Security Series
Status
Available
Call number
005.8
Ask About This
Linux kernel internals
by
Michael Beck
Paper Book, 1998
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.4/469
Ask About This
Stealing the network : how to own the box
by
Ryan Russell
Paper Book, 2003
Collections
Main Stacks
,
Your library
Series
Stealing the Network (Book 1)
Status
Available
Call number
005.8
Ask About This
Stealing the Network: How to Own a Continent
by
FX
Paperback, 2004
Collections
Main Stacks
,
Your library
Series
Stealing the Network (Book 2)
Status
Available
Call number
005.8
Ask About This
Google hacks : [100 industrial-strength tips & tools]
by
Tara Calishain
Paper Book, 2003
Collections
Main Stacks
,
Your library
Series
Hacks
Status
Available
Call number
025.04
Ask About This
Chaos in Wonderland : visual adventures in a fractal world
by
Clifford A. Pickover
Paper Book, 1994
Collections
Main Stacks
,
Your library
Status
Available
Call number
003/.7
Ask About This
The mathematical theory of communication
by
Claude Elwood Shannon
Paper Book, 1998
Collections
Main Stacks
,
Your library
Status
Available
Call number
621.382
Ask About This
The Van Cliburn legend
by
Abram Chasins
Paper Book, 1959
Collections
Main Stacks
,
Your library
Status
Available
Call number
786.2092
Ask About This
Building secure software how to avoid security problems the right way
by
John Viega
Paper Book, 2002
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.1
Ask About This
Yeager : An Autobiography
by
Chuck Yeager
Other, 1985
Collections
Main Stacks
,
Your library
Status
Available
Call number
623.7460480924
Ask About This
Studies in Isaiah
by
F. C. Jennings
Paperback, 2001
Collections
Main Stacks
,
Your library
Status
Available
Call number
224.1
Ask About This
Let's Roll!: Ordinary People, Extraordinary Courage
by
Lisa Beamer
Hardcover, 2002
Collections
Main Stacks
,
Your library
Status
Available
Call number
973.931092
Ask About This
George Muller: Man of Faith (Heroes of the Faith)
by
Bonnie Harvey
Paperback, 1998
Collections
Main Stacks
,
Your library
Series
Heroes of the Faith
Status
Available
Call number
289.9
Ask About This
Uncertainty and vagueness in knowledge based systems : numerical methods
by
Rudolf Kruse
Paper Book, 1991
Collections
Main Stacks
,
Your library
Status
Available
Call number
006.3
Ask About This
Artificial intelligence
by
Patrick Henry Winston
Paper Book, 1984
Collections
Main Stacks
,
Your library
Status
Available
Call number
001.53/5
Ask About This
Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence
by
John H. Holland
Paperback, 1992
Collections
Main Stacks
,
Your library
Status
Available
Call number
574.5015118
Ask About This
Introductory Complex Analysis (Dover Books on Mathematics)
by
Richard A. Silverman
Paperback, 1984
Collections
Main Stacks
,
Your library
Status
Available
Call number
515.9
Ask About This
Automatic sequences : theory, applications, generalizations
by
Jean-Paul Allouche
Paper Book, 2003
Collections
Main Stacks
,
Your library
Status
Available
Call number
515/.24
Ask About This
Computers and Typesetting, Volume A : The Texbook
by
Donald Knuth
Other, 1986
Collections
Main Stacks
,
Your library
Series
Computers and Typesetting (Volume A)
Status
Available
Call number
686.22544
Ask About This
A Course in Fuzzy Systems and Control
by
Li-Xin Wang
Other, 1996
Collections
Main Stacks
,
Your library
Status
Available
Call number
629.83
Ask About This
Constraint processing
by
Rina Dechter
Paper Book, 2003
Collections
Main Stacks
,
Your library
Series
The Morgan Kaufmann Series in Artificial Intelligence
Status
Available
Call number
005.1/1
Ask About This
Internetworking with TCP/IP: Vol.II, Design, Implementation, and Internals
by
Douglas E. Comer
Hardcover, 1994
Collections
Main Stacks
,
Your library
Series
Internetworking with TCP/IP (Volume II)
Status
Available
Call number
004.6
Ask About This
1: ‰Principles, protocols, and architecture
by
Douglas E. Comer
Paper Book, 1995
Collections
Main Stacks
,
Your library
Series
Internetworking with TCP/IP (Volume I)
Status
Available
Call number
005.2
Ask About This
Physical design of Yagi antennas
by
David B. Leeson
Paper Book, 1992
Collections
Main Stacks
,
Your library
Status
Available
Call number
621.384/135
Ask About This
Philosophy: Who Needs It?
by
Ayn Rand
Paperback, 1982
Collections
Main Stacks
,
Your library
Status
Available
Call number
100
Ask About This
Visual thinking puzzles
by
Michael A. Dispezio
Paper Book, 1998
Collections
Main Stacks
,
Your library
Status
Available
Call number
793.73
Ask About This
Extreme exploits : advanced defenses against hardcore hacks
by
Victor Oppleman
Paper Book, 2005
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.8
Ask About This
Smart Guide: Plumbing Step by Step, All New and Updated 2nd Edition (Creative Homeowner) How to Repair and Upgrade Faucets, Sinks, Toilets, and More (Home Improvement)
by
Editors of Creative Homeowner
Paperback, 2009
Collections
Main Stacks
,
Your library
Status
Available
Call number
696.1
Ask About This
IPng, Internet protocol next generation
by
Scott O. Bradner
Paper Book, 1996
Collections
Main Stacks
,
Your library
Status
Available
Call number
004.6/2
Ask About This
KDE application development
by
Uwe Thiem
Paper Book, 1999
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.4/3769
Ask About This
InfoWar
by
Gerfried Stocker
Paper Book, 1998
Collections
Main Stacks
,
Your library
Status
Available
Call number
004
Ask About This
DNS and BIND
by
Paul Albitz
Paper Book, 1998
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.7/1376
Ask About This
Information warfare and security
by
Dorothy Elizabeth Robling Denning
Paper Book, 1999
Collections
Main Stacks
,
Your library
Status
Available
Call number
355.3/43
Ask About This
Discrete event simulation in C
by
Kevin Watkins
Paper Book, 1993
Collections
Main Stacks
,
Your library
Status
Available
Call number
003/.83/01135113
Ask About This
Prime-Detecting Sieves (LMS-33)
by
Glyn Harman
Other, 2007
Collections
Main Stacks
,
Your library
Status
Available
Call number
512.7
Ask About This
Network algorithmics : an interdisciplinary approach to designing fast networked devices
by
George Varghese
Paper Book, 2005
Collections
Main Stacks
,
Your library
Series
Morgan Kaufmann Series in Data Management Systems
Status
Available
Call number
004.62
Ask About This
Information warfare : principles and operations
by
Edward Waltz
Paper Book, 1998
Collections
Main Stacks
,
Your library
Status
Available
Call number
355.3/43
Ask About This
Metasploit : The Penetration Tester's Guide
by
David Kennedy
Other, 2011
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.8
Ask About This
Metasploit : The Penetration Tester's Guide
by
David Kennedy
Other, 2011
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.8
Ask About This
The Far Side Gallery 4
by
Gary Larson
Other, 1993
Collections
Main Stacks
,
Your library
Series
The Far Side (10-12)
,
The Far Side Gallery (4)
Status
Available
Call number
741.5973
Ask About This
Graphical applications with Tcl and Tk
by
Eric Foster-Johnson
Paper Book, 1996
Collections
Main Stacks
,
Your library
Status
Available
Call number
005.13/3
Ask About This
Networks and netwars : the future of terror, crime, and militancy
by
John Arquilla
Paper Book, 2001
Collections
Main Stacks
,
Your library
Status
Available
Call number
303.6/25
Ask About This
Widerstand und Ergebung
by
Dietrich Bonhoeffer
Paper Book, 1997
Collections
Main Stacks
,
Your library
Status
Available
Call number
230.092
Ask About This
531 items
1
2
3
4
5
...
10
11
relevancy
Sort
relevancy
acquisition
title
date
author
popularity
series
531 items
5
531 items found
Sort
relevancy
acquisition
title
date
author
popularity
series
Page: 1.2576 seconds
This is dld2517's personal library, powered by
TinyCat
powered by
TinyCat
Personal Edition