Carroll, John Millar, 1925-
Carroll, John Millar
Carroll, John M. (John Millar), 1925-2011
Carroll, John M., 1925-2011
Carroll, John M., 1925-
Carroll, John M. (John Millar), 1925-
Carroll, John M.
VIAF ID: 79278822 ( Personal )
Permalink: http://viaf.org/viaf/79278822
Preferred Forms
-
- 100 1 _ ‡a Carroll, John M.
-
-
- 100 1 _ ‡a Carroll, John M. ‡q (John Millar), ‡d 1925-2011
-
- 100 1 _ ‡a Carroll, John M., ‡d 1925-2011
- 100 1 _ ‡a Carroll, John M., ‡d 1925-2011
- 100 1 _ ‡a Carroll, John Millar
-
- 100 1 _ ‡a Carroll, John Millar ‡d 1925-
- 100 1 _ ‡a Carroll, John Millar ‡d 1925-
-
- 100 1 _ ‡a Carroll, John Millar, ‡d 1925-
4xx's: Alternate Name Forms (18)
Works
Title | Sources |
---|---|
Analysis of the structure of police patrol areas. | |
The automated in-basket | |
The binary derivative test for the appearance of randomness and its use as a noise filter | |
Careers and opportunities in computer science | |
Chaotic cryptography | |
Comparative evaluation of crytographic strategies | |
Computer security | |
Computer selection of keywords using word-frequency analysis | |
Computer simulation in emergency planning : proceedings of the Conference on Computer Simulation in Emergency Planning, 27-29 January 1983, San Diego, California | |
Conceptual design of access-control automata | |
Confidential information sources: public and private | |
Controlling white-collar crime, 1982: | |
Denshi debaisu to kairo | |
Design manual for transistor circuits | |
Design of a secure relational data base | |
Electron devices and circuits | |
elektronische Krieg | |
Fundamentos y aplicaciones del laser | |
Hardening DES by using multi-variable decipherable Boolean functions | |
HCI models, theories and frameworks : toward a multidisciplinary science | |
Implementing multi-level security (MLS) by violation privilege | |
Keisanki kagaku ni shoku o motomeyo. | |
Managing risk : a computer-aided strategy | |
Mechanical design for electronics production | |
Modern transistor circuits | |
n79089576 | |
The password predictor : a training aid for raising security awareness | |
Poluprovodnikovye shemy dlâ novoj tehniki | |
Prevention of computer-based fraud : final report : prepared for Canadian Certified General Accountant's Association | |
Reza monogatari. | |
The risk-analysis continuum | |
Secrets of electronic espionage | |
Simulation of time-series perturbations for evaluating change detectors | |
Simulation using personal computers | |
Standard handbook for electrical engineers | |
Story of the laser | |
Tehnologiâ proizvodstva radioapparatury | |
Todesstrahlen? Die Geschichte d. Laser | |
Tunnel-diode and semiconductor circuits | |
Weak keys and weak data : foiling the two nemeses | |
레이저이야기 | |
レーザ物語 | |
電子デバイスと回路 | |
計算機科学に職を求めよう |