Hours
Libraries & Collections
Joyner Library
Laupus Health Sciences Library
Music Library
Digital Collections
Special Collections
Teaching Resources Center
The ScholarShip Institutional Repository
Country Doctor Museum
Get Help
ECU Libraries Catalog
Browse
Call Number
Title
Author
Subject
Series
Advanced Search
Course Reserves
Suggest a Purchase
My Account
Preview Version:
You're viewing our new catalog design.
Share your feedback
or
return to the current catalog
.
Find Materials By
Format
Toggle Format Facet
Electronic
18
Book
7
Print
7
Archival & Manuscript Material
0
Atlas
0
More Formats
Library Location
Toggle Library Location Facet
Joyner Library
25
Laupus Library
15
Music Library
14
Publication Date
Toggle Publication Date Facet
Since 2020
3
2010-2019
17
2000-2009
3
1990-1999
1
1980-1989
1
More Publication Dates
Call Number
Toggle Call Number Facet
Q - Science
4
T - Technology
2
H - Social Science
1
Collection
Toggle Collection Facet
Joyner E-Resources
18
Laupus E-Resources
15
Joyner Stacks
7
Language
Toggle Language Facet
English
25
Genre
Toggle Genre Facet
Electronic books
15
Congresses
2
Legislative materials
1
Nonfiction
1
PE61102A
1
Era
Toggle Era Facet
Region
Toggle Region Facet
Outer space
1
United States
1
Search Results
All Fields
Title
Author
Journal Title
Subject
Series
ISBN/ISSN
Publisher
Advanced
Search
Start Over
You searched for:
subject
"Computer security+Mathematics."
Remove constraint
Showing 11 - 20 of 25 results
Sort by: Relevance;
Relevance
Year (Descending)
Year (Ascending)
Author (Ascending)
Author (Descending)
Title (Ascending)
Title (Descending)
10 per page
10 per page
20 per page
50 per page
100 per page
Search Results
Computational number theory
by
Das, Abhijit, 1968-
2013
Format:
Book
Joyner Library
- Item has been checked out
Call Number:
QA241 .D37 2013
A model of security monitoring
by
Bishop, Matt
1989
Format:
Electronic
Location
Access Content Online
Information security and optimization
2021
First edition
Format:
Electronic
Location
Access Content Online
Malware diffusion models for modern complex networks
by
Karyotis, Vasileios
2016
Format:
Electronic
Location
Access Content Online
Multi-fractal traffic and anomaly detection in computer communications
by
Li, Ming
2023
First edition
Format:
Electronic
Location
Access Content Online
Verification of infinite-state systems with applications to security
2006
Format:
Electronic
Location
Access Content Online
Machine learning for computer and cyber security
2019
Format:
Electronic
Location
Access Content Online
Bayesian methods for hackers
by
Davidson-Pilon, Cameron
2016
Format:
Book
Joyner Library
- General Stacks
Call Number:
QA76.9 .A25 D376 2016
A proposed modeling protocol for evaluating information attacks
by
Brand, John H
1999
Format:
Electronic
Location
Access Content Online
Ending spam
by
Zdziarski, Jonathan A.
2005
Format:
Book
Location
Access Content Online
Previous
1
2
3
Next