371. Information technology. Security techniques. Encryption algorithms. Identity-based ciphers Part 5, (9th March 2021) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (52 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
372. BS ISO/IEC 16388. Information technology. Automatic identification and data capture techniques. Code 39 bar code symbology specification. (1st April 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (24 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
373. Tracked Changes. Information security. Message authentication codes (MACs). Mechanisms using a dedicated hash-function Part 2, (3rd May 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (152 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
374. Tracked Changes. Information security. Key management. Mechanisms using asymmetric techniques Part 3, (13th May 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (246 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
375. Stochastic linear programming algorithms : a comparison based on a model management system /: a comparison based on a model management system. (2022) Authors: Mayer, János Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
376. Partial-update adaptive filters and adaptive signal processing : design analysis and implementation /: design analysis and implementation. (2008) Other Names: Doğançay, Kutluyıl Record Type: Book Extent: 1 online resource (296 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
377. Transforms and applications handbook. ([2018?]) Editors: Poularikas, Alexander D, 1933- Record Type: Book Extent: 1 online resource (various pagings), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
378. Algorithm audit : why, what, and how? /: why, what, and how?. (2022) Authors: Aragona, B (Biagio) Record Type: Book Extent: 1 online resource (xxi, 75 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
379. Information technology. Security techniques. Message Authentication Codes (MACs). Mechanisms using a block cipher Part 1, (31st August 2023) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (50 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
380. Algorithms : technology, culture, politics /: technology, culture, politics. (2023) Authors: Matzner, Tobias Record Type: Book Extent: 1 online resource (192 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗