Beyond the tracatus wars The new wittgenstein debate
By: Contributor(s): Material type:
TextLanguage: English Publication details: New York Taylor and Francis U.S.A 2011Description: vi, 200p. cmISBN: - 9780415874403 (pbk)
- R3xM891:g, Q1
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Arts Library | Arts Library | R3xM891:g Q1 (Browse shelf(Opens below)) | Available | AL1487308 |
There are no comments on this title.
Log in to your account to post a comment.
-
501
Security Modeling and Analysis of Mobile Agent Systems
by Lu Ma & Tsai Jeffery J P -
502
Security of e-systems and computer networks
by Obaidat Mohammad S -
503
Security of information and communication networks
by Kartalopoulos Stamatios V -
504
Security policies and implementation issues
by Rob Johnson -
505
Security risk assessment handbook: A complete guide for performing security risk assessments
by Landoll Douglas J -
506
Security software development: Assessing and managing security risks
by Ashbaugh Douglas A -
507
Security strategies in window platforms and applications
by Solomon Michael G -
508
Security strategy from requirements to reality
by Stackpole Bill -
509
Security technologies for the world wide web
by Oppliger Rolf -
510
Security, accuracy and privacy in computer systems
by Martin James -
511
Security, accuracy, and privacy in computer systems
by Martin J -
512
Security, accuracy, and privacy in computer systems
by Martin J -
513
Security, Privacy and Reliability in Computer Communications and Networks
by Kewei Sha; Aaron Striegel; Min Song -
514
Security: A critical introduction
by Jarvis Lee -
515
SIP secuity
by Sisalem Dorgham -
516
Smart card security and applications
by Hendry Mike -
517
Smart cards, tokens, security and applications
by Mayes Keith E Ed. -
518
Smart cards, tokens, security and applications
by Mayes Keith Ed. -
519
Soft computing techniques for intrusion detection
by Gomez Jonatan -
520
Software engineering
by Sommerville Ian -
521
Software engineering
by Sommerville Ian -
522
Software engineering
by Sommerville Ian -
523
Software engineering
by Sommerville Ian -
524
Software engineering
by Sommerville Ian -
525
Software engineering
by Sommerville Ian -
526
Software engineering
by Sommerville Ian -
527
Software engineering
by Sommerville Ian -
528
Software engineering
by Sommerville Ian -
529
Software engineering
by Sommerville Ian -
530
Software engineering
by Sommerville Ian -
531
Software engineering
by Sommerville Ian -
532
Software engineering
by Sommerville Ian -
533
Software engineering
by Sommerville Ian -
534
Software engineering
by Sommerville Ian -
535
SSL and TLS:theory and practice
by Oppliger Rolf -
536
Statistical Pattern Recognition
by Webb, Andrew R. -
537
Symmetric cryptographic protocols
by Ramkurmar Mahalingam -
538
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
by Lin Hua -
539
Techniques for enhancing the security of android framework
by Verma Sushma Au. -
540
Techniques for security in grid computing
by Bhatia Manjot Kaur Au. -
541
Testing in 30 +open source tools
by Shende Rahul -
542
Testing in 30+ open source tools
by Shende Rahul -
543
Towards hardware intrinsic security: Foundations and practice
by Sadeghi Ahmad-Reza Ed.; Naccache David Ed. -
544
Transportation infrastructure security utilizing intelligent transportation systems
by Fries Ryan -
545
Trust and security in collaborative computing
by Zou Xukai -
546
Trust and Security in Collaborative Computing
by Zou Xukai Et Al -
547
Trusted communications with physical layer security for 5G and beyond
by Duong Trung Q Ed. -
548
Trustworthy computing: Analytical and quantitative engineering evaluation
by Sahinoglu M -
549
Understanding and applying cryptography and data security
by Elbert Adam J -
550
Understanding computers
by Editors of Time Life Books
Beyond the tracatus wars
APA
Read Rupert Ed, Lavery Matthew A. Ed, . (2011). Beyond the tracatus wars. New York: Taylor and Francis U.S.A.
Chicago
Read Rupert Ed, Lavery Matthew A. Ed, . 2011. Beyond the tracatus wars. New York: Taylor and Francis U.S.A.
Harvard
Read Rupert Ed, Lavery Matthew A. Ed, . (2011). Beyond the tracatus wars. New York: Taylor and Francis U.S.A.
MLA
Read Rupert Ed, Lavery Matthew A. Ed, . Beyond the tracatus wars. New York: Taylor and Francis U.S.A. 2011.
