Statistics: Basic techniques for solving applied problems Book S A
By: Material type:
TextLanguage: English Publication details: New York New York, McGraw-Hill 1977Description: 532pOther classification: - B28 L7
Textbook
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textbook
|
Faculty of Management Library | Faculty of Management Library | B28 L7 (Browse shelf(Opens below)) | Available | ML0589073 |
There are no comments on this title.
Log in to your account to post a comment.
-
1801
Cryptography and network security: Principles and practice
by Stallings William -
1802
Cryptography and network security: Principles and practice
by Stallings William -
1803
Cryptography and network security: Principles and practice
by Stallings William -
1804
Cryptography and network security: Principles and practice
by Stallings William -
1805
Cryptography and network security: Principles and practice
by Stallings William -
1806
Cryptography and network security: Principles and practice
by Stallings William -
1807
Cryptography and network security: Principles and practice
by Stallings William -
1808
Cryptography and network security: Principles and practice
by Stallings William -
1809
Cryptography and network security: Principles and practice
by Stallings William -
1810
Cryptography and network security: Principles and practice
by Stallings William -
1811
Cryptography and network security: Principles and practice
by Stallings William -
1812
Cryptography and network security: Principles and practice
by Stallings William -
1813
Cryptography and network security: Principles and practice
by Stallings William -
1814
Cryptography and network security: Principles and practice
by Stallings William -
1815
Cryptography and network security: Principles and practice
by Stallings William -
1816
Cryptography and network security: Principles and practice
by Stallings William -
1817
Cryptography and network security: Principles and practice
by Stallings William -
1818
Cryptography and network security: Principles and practice
by Stallings William -
1819
Cryptography and network security: Principles and practice
by Stallings William -
1820
Cryptography and network security: Principles and practice
by Stallings William -
1821
Cryptography and network security: Principles and practice
by Stallings William -
1822
Cryptography and network security: Principles and practice
by Stallings William -
1823
Cryptography and network security: Principles and practice
by Stallings William -
1824
Cryptography and network security: Principles and practice
by Stallings William -
1825
Cryptography and network security: Principles and practice
by Stallings William -
1826
Cryptography and network security: Principles and practice
by Stallings William -
1827
Cryptography and network security: Principles and practice
by Stallings William -
1828
Cryptography and network security: Principles and practice
by Stallings William -
1829
Cryptography and network security: Principles and practice
by Stallings William -
1830
Cryptography and network security: Principles and practice
by Stallings William -
1831
Cryptography and network security: Principles and practice
by Stallings William -
1832
Cryptography and network security: Principles and practice
by Stallings William -
1833
Cryptography and network security: Principles and practice
by Stallings William -
1834
Cryptography and network security: Principles and practice
by Stallings William -
1835
Cryptography and networks security
by Kahate Atul -
1836
Cryptography and security
by Shyamala C K; Harini N; Padmanabhan T R -
1837
Cryptography and security
by Shyamala C K; Harini N; Padmanabhan T R -
1838
Cryptography engineering:design principles and practical applications
by Ferguson Niels -
1839
Cryptography for security and privacy in cloud computing
by Rass Stefan; Slamanig Daniel -
1840
Cryptography in constant parallel time
by Applebaum Benny -
1841
Cryptography in the database: The last line of defense
by Kenan Kevin -
1842
Cryptography in the Information Society
by Ryabko Boris Et Al -
1843
Cryptography research perspectives
by Chen Roland E Ed. -
1844
Cryptography, information theory and error-correction: A handbook for the 21st century
by Bruen Aiden A -
1845
Cryptography: Theory and practice
by Stinson Douglas R -
1846
Cryptology for Engineers: an Application-Oriented Mathematical Introduction
by Schmied Robert -
1847
Cryptology: Classical and modern with maplets
by Klima Richard E; Sigmon Niel P -
1848
Crytography in C and C++
by Welschenbach Michael -
1849
CSA Guide to Cloud Computing
by Samani, Raj -
1850
CSF user's manual for OSIRIS/140 data management a
Statistics: Basic techniques for solving applied problems
APA
Book S A, . (1977). Statistics: Basic techniques for solving applied problems. New York: New York, McGraw-Hill.
Chicago
Book S A, . 1977. Statistics: Basic techniques for solving applied problems. New York: New York, McGraw-Hill.
Harvard
Book S A, . (1977). Statistics: Basic techniques for solving applied problems. New York: New York, McGraw-Hill.
MLA
Book S A, . Statistics: Basic techniques for solving applied problems. New York: New York, McGraw-Hill. 1977.
