Theory of incomplete cylindrical functions and their applications
By: Contributor(s): Material type:
TextLanguage: English Series: Die grundlehren der mathematischen wissenschaften; 160Publication details: Berlin Springer-Verlag 1971Description: x, 330p. cmSubject(s): DDC classification: - B393M2, L1
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Central Science Library | Central Science Library | B393M2 L1 (Browse shelf(Opens below)) | Available | SL0516996 |
There are no comments on this title.
Log in to your account to post a comment.
-
9101
Cryptography and network security: Principles and practice
by Stallings William -
9102
Cryptography and network security: Principles and practice
by Stallings William -
9103
Cryptography and network security: Principles and practice
by Stallings William -
9104
Cryptography and network security: Principles and practice
by Stallings William -
9105
Cryptography and network security: Principles and practice
by Stallings William -
9106
Cryptography and network security: Principles and practice
by Stallings William -
9107
Cryptography and network security: Principles and practice
by Stallings William -
9108
Cryptography and network security: Principles and practice
by Stallings William -
9109
Cryptography and network security: Principles and practice
by Stallings William -
9110
Cryptography and network security: Principles and practice
by Stallings William -
9111
Cryptography and network security: Principles and practice
by Stallings William -
9112
Cryptography and network security: Principles and practice
by Stallings William -
9113
Cryptography and network security: Principles and practice
by Stallings William -
9114
Cryptography and network security: Principles and practice
by Stallings William -
9115
Cryptography and network security: Principles and practice
by Stallings William -
9116
Cryptography and network security: Principles and practice
by Stallings William -
9117
Cryptography and network security: Principles and practice
by Stallings William -
9118
Cryptography and network security: Principles and practice
by Stallings William -
9119
Cryptography and network security: Principles and practice
by Stallings William -
9120
Cryptography and network security: Principles and practice
by Stallings William -
9121
Cryptography and network security: Principles and practice
by Stallings William -
9122
Cryptography and network security: Principles and practice
by Stallings William -
9123
Cryptography and network security: Principles and practice
by Stallings William -
9124
Cryptography and network security: Principles and practice
by Stallings William -
9125
Cryptography and network security: Principles and practice
by Stallings William -
9126
Cryptography and network security: Principles and practice
by Stallings William -
9127
Cryptography and network security: Principles and practice
by Stallings William -
9128
Cryptography and network security: Principles and practice
by Stallings William -
9129
Cryptography and network security: Principles and practice
by Stallings William -
9130
Cryptography and network security: Principles and practice
by Stallings William -
9131
Cryptography and network security: Principles and practice
by Stallings William -
9132
Cryptography and network security: Principles and practice
by Stallings William -
9133
Cryptography and network security: Principles and practice
by Stallings William -
9134
Cryptography and network security: Principles and practice
by Stallings William -
9135
Cryptography and network security: Principles and practice
by Stallings William -
9136
Cryptography and network security: Principles and practice
by Stallings William -
9137
Cryptography and network security: Principles and practice
by Stallings William -
9138
Cryptography and networks security
by Kahate Atul -
9139
Cryptography and security
by Shyamala C K; Harini N; Padmanabhan T R -
9140
Cryptography and security
by Shyamala C K; Harini N; Padmanabhan T R -
9141
Cryptography engineering:design principles and practical applications
by Ferguson Niels -
9142
Cryptography for security and privacy in cloud computing
by Rass Stefan; Slamanig Daniel -
9143
Cryptography in constant parallel time
by Applebaum Benny -
9144
Cryptography in the database: The last line of defense
by Kenan Kevin -
9145
Cryptography in the Information Society
by Ryabko Boris Et Al -
9146
Cryptography, information theory and error-correction: A handbook for the 21st century
by Bruen Aiden A -
9147
Cryptography: Theory and practice
by Stinson Douglas R -
9148
Cryptology for Engineers: an Application-Oriented Mathematical Introduction
by Schmied Robert -
9149
Cryptology: Classical and modern with maplets
by Klima Richard E; Sigmon Niel P -
9150
Crystal Chemistry: from Basics to Tools for Materials Creation
by Ferey Gerard
Theory of incomplete cylindrical functions and their applications
APA
Agrest M M, Maksimov M S, . (1971). Theory of incomplete cylindrical functions and their applications. Berlin: Springer-Verlag.
Chicago
Agrest M M, Maksimov M S, . 1971. Theory of incomplete cylindrical functions and their applications. Berlin: Springer-Verlag.
Harvard
Agrest M M, Maksimov M S, . (1971). Theory of incomplete cylindrical functions and their applications. Berlin: Springer-Verlag.
MLA
Agrest M M, Maksimov M S, . Theory of incomplete cylindrical functions and their applications. Berlin: Springer-Verlag. 1971.
