International monetary system Highlights from fif
By: Material type:
TextLanguage: English Publication details: Boulder Westview Press 1993Description: vii, 405p cmISBN: - 083317657
- X:57, N3
General Books
No physical items for this record
There are no comments on this title.
Log in to your account to post a comment.
-
1
Case studies in secure computing
-
2
Data communications and networking
by Forouzan, Behrouz A -
3
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
4
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
5
Digital watermarking and steganography: Fundamentals and techniques
by Shih Frank Y -
6
Emerging security algorithms and techniques
by Ahmad Khaleel Ed. -
7
Enhancing cryptographic pimitives with techniques from error correcting codes
by Preneel Bart Ed. -
8
Evaluating indirect and direct classification techniques for network intrusion detection
by Ibrahim Nawal H -
9
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
by Dube Roger -
10
Intelligence and security informatics:techniques and applications
by Chen Hsinchun Ed. -
11
Multimedia security: steganography and digital watermarking techniques for protection of intellectual property
by Lu Chun-Shien -
12
Operating systems : Integrals and design principles
by Stalling Williams -
13
Operating systems : Integrals and design principles
by Stalling Williams -
14
Operating systems : Integrals and design principles
by Stalling Williams -
15
Practical Data Mining
by Hancock, Monte F. -
16
REID security:techniques, protocols and system-on-chip design
by Kitsos Paris Ed. -
17
Security Enhancement Techniques for efficient routing in opportunistic internet of things
by Kandhoul Nisha Au. -
18
Soft computing techniques for intrusion detection
by Gomez Jonatan -
19
Statistical Pattern Recognition
by Webb, Andrew R. -
20
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
by Lin Hua -
21
Techniques for enhancing the security of android framework
by Verma Sushma Au. -
22
Techniques for security in grid computing
by Bhatia Manjot Kaur Au. -
23
Wireless security and privacy: best practices and design techniques
by Swaminatha Tara M
International monetary system
APA
Kenen Peter B, . (1993). International monetary system. Boulder: Westview Press.
Chicago
Kenen Peter B, . 1993. International monetary system. Boulder: Westview Press.
Harvard
Kenen Peter B, . (1993). International monetary system. Boulder: Westview Press.
MLA
Kenen Peter B, . International monetary system. Boulder: Westview Press. 1993.
