1
Published 2013
Table of Contents: ... -- Beautiful Imperative Code: A Functional Ace in the Hole for Imperative Programmers....
View full text
Electronic eBook
2
Published 2014
Table of Contents: ... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...
View full text
Electronic eBook