<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'su:{ Network information theory}']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Network%20information%20theory%7D&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Network%20information%20theory%7D&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:{ Network information theory}' at Delhi University Library System]]> </description> <opensearch:totalResults>6</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Network%20information%20theory%7D&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dsu%253A%257B%2520Network%2520information%2520theory%257D" startPage="" /> <item> <title> Cryptography and network security </title> <dc:identifier>ISBN:9788770224079</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1237792</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8770224072.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By De Alencar, Marcelo Sampaio.<br /> Boca Raton CRC Press/T&amp;F 2022 .<br /> xxiii, 297p. ill. 9788770224079 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1237792">Place hold on <em>Cryptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1237792</guid> </item> <item> <title> Elements of information theory </title> <dc:identifier>ISBN:9788126508143 (pbk) | SL01559120</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=15487</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8126508140.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Cover Thomas M; Thomas Joy A.<br /> Noida Wiley-India 2006 .<br /> xxii,542p. , Bibliography 510-525p.; List of symbols 526p.; Index 529-542p. 9788126508143 (pbk) | SL01559120 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=15487">Place hold on <em>Elements of information theory</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=15487</guid> </item> <item> <title> Game theoretic problems in network economics and mechanism design solutions </title> <dc:identifier>ISBN:9781848009370 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=29018</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1848009372.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Narahari Y.<br /> London Springer 2009 .<br /> xxi, 274p. , Includes bibliographical references.; Index 271-274p. cm..<br /> 9781848009370 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=29018">Place hold on <em>Game theoretic problems in network economics and mechanism design solutions</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=29018</guid> </item> <item> <title> Information theory and network coding </title> <dc:identifier>ISBN:9780387792330 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28798</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0387792333.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Yeung Raymond W.<br /> New York Springer 2008 .<br /> xx, 579p. , Bibliography 541-560p.; Index 561-579p. cm..<br /> 9780387792330 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28798">Place hold on <em>Information theory and network coding</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28798</guid> </item> <item> <title> Physical layer security : from information theory to security engineering </title> <dc:identifier>ISBN:9780521516501 (hbk) | SL01561038</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=7403</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0521516501.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bloch Matthieu; Barros Joao.<br /> Cambridge Cambridge University 2011 .<br /> xvi,329p. , References 311-322p.'; Author index 323-325p.; Subject index 326-329p. 9780521516501 (hbk) | SL01561038 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=7403">Place hold on <em>Physical layer security : from information theory to security engineering</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=7403</guid> </item> <item> <title> Theory of neural information processing systems </title> <dc:identifier>ISBN:0198530242 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=45785</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0198530242.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Coolen A C C.<br /> Oxford Oxford University Press 2005 .<br /> xvi, 569p. , Appendix A-I, 511-554p. cm..<br /> 0198530242 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=45785">Place hold on <em>Theory of neural information processing systems</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=45785</guid> </item> </channel> </rss>
