Advanced structural inorganic chemistry Zhou Gong-Du Mak Thomas Chung Wai
By: Contributor(s): Material type:
TextLanguage: English Series: International union of crystallography texts on crystallography, 10Publication details: Oxford Oxford University Press 2008Description: xx, 819p. cmISBN: - 9780199216956 (pbk)
- E1, P8;1 Carc
Textbook
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textbook
|
Department of Chemistry Library | Department of Chemistry Library | E1 P8;1 Carc (Browse shelf(Opens below)) | Available | CD0007678 |
Includes bibliographical references.; Index 811-819p.
There are no comments on this title.
-
351
Introduction to network security
by Jacobson Douglas -
352
Introduction to security and network forensics
by Buchanan William J -
353
Intrrnational handbook of computer security
by Shim Jae K Ed. -
354
An Investigation into Security and Privacy Issues in Biometrics
by Arora Shefali Au. -
355
Investigator's guide to steganography
by Kipper Gregory -
356
IT security: Advice from experts
by Oliva Lawrence M -
357
IT-Security and privacy: design and use of privacy-enhancing security mechanisms
by Fischer-Hubner Simone -
358
Java security
by Oaks Scott -
359
Kish Cypher, the: the Story of Kljn for Unconditional Security
by Kish Laszlo B -
360
Linux system security: the administrator's guide to open source security tools
by Mann Scott -
361
Linux system security: the administrator's guide to open source security tools
by Mann Scott -
362
Load balancing servers, firewalls, and caches
by Kopparapu Chandra -
363
Lognormality Principle and Its Applications in E-Security, E-Learning and E-Health, The
by Plamondon Rejean Et Al -
364
Low tech hacking : street smarts for security professionals
by Wiles Jack; Gudaitis Terry; Jabbusch Jennifer; Rogers Russ; Lowther Sean -
365
LTE security
by Forsberg Dan; Horn Gunther; Moeller Wolf Dietrich; Niemi Valtteri -
366
LTE security
by Forsberg Dan; Horn Gunther; Moeller Wolf-Dietrich; Niemi Valtteri -
367
Machine Learning for Computer and Cyber Security
by Brij B. Gupta; Quan Z. Sheng -
368
Machine learning forensics for law enforcement security and intelligence
by Mena Jesus -
369
Machine learning in cyber trust:security, privacy, and reliability
by Tsai Jeffrey J P Ed. -
370
Managing an information security and privacy awareness and training program
by Herold Rebecca -
371
Managing information security
by Vacca John R Ed. -
372
Managing information security and privacy awareness and training program
by Herold Rebecca -
373
Managing trust in cyberspace
by Thampi Sabu M Ed.; Bhargava Bharat Ed.; ATrey Pradeep K Ed. -
374
Mark stamp's information security : principles and practice
by Shah Deven N -
375
Mark stamp's information security : principles and practice
by Shah Deven N -
376
Microsoft encyclopedia of security
by Tulloch Mitch -
377
Microsoft windows security fundamentals
by Clercq Jan de -
378
Mobile and Wireless Networks Security - Proceedings of the Mwns 2008 Workshop
by Laurent-Naknavicius Maryline & Chaouchi Hakima -
379
Mobile communication systems and security
by Rhee Man Young -
380
Mobile sensors and context-aware computing
by Gajjar Manish J -
381
Multicast and group security
by Hardjono Thomas -
382
Multidisciplinary introduction to information security
by Mjolsnes S F -
383
Multihop Wireless Networks
by Zeng, Kai -
384
Multilevel security for relational databases
by Faragallah Osama S -
385
Multimedia communication security:recent advances
by Lian Shiguo Ed. -
386
Multimedia security : watermarking,steganography,and forensics
by Shih Frank Y Ed. -
387
Multimedia security: steganography and digital watermarking techniques for protection of intellectual property
by Lu Chun-Shien -
388
Multivariable calculus
by Gupta Anuradha -
389
Multivariable calculus
by Gupta Anuradha -
390
Network and internetwork security: principles and practice
by Stallings William -
391
Network attacks and defenses : a hands on approach
by Trabelsi Zouheir; Hayawi Kadhim; Braiki Arwa Al; WMathe Sujith Samuel -
392
Network security
by Fadia Ankit -
393
Network security
by Fadia Ankit -
394
Network security
by Fadia Ankit -
395
Network security
by Fadia Ankit -
396
Network security
by Fadia Ankit -
397
Network security
by Kaufman Charlie -
398
Network security
by Kaufman Charlie -
399
Network security
by Kaufman Charlie -
400
Network security
by Kaufman Charlie
Advanced structural inorganic chemistry
APA
Li Wai-Kee, Mak Thomas Chung Wai & Zhou Gong-Du. (2008). Advanced structural inorganic chemistry. Oxford: Oxford University Press.
Chicago
Li Wai-Kee, Mak Thomas Chung Wai and Zhou Gong-Du. 2008. Advanced structural inorganic chemistry. Oxford: Oxford University Press.
Harvard
Li Wai-Kee, Mak Thomas Chung Wai and Zhou Gong-Du. (2008). Advanced structural inorganic chemistry. Oxford: Oxford University Press.
MLA
Li Wai-Kee, Mak Thomas Chung Wai and Zhou Gong-Du. Advanced structural inorganic chemistry. Oxford: Oxford University Press. 2008.
