Constrained Optimization and Lagrange Multiplier Methods
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Multiplier ideal sheaves and analytic methods in algebraic geometry
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings