|
461.
|
Practical software factories in .NET
by Lenz, Gunther | Wienands, Christoph. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berkeley: Apress, 2006Availability: Items available for loan: [Call number: 005.276 LEN] (1).
|
|
462.
|
Security data visualization : graphical techniques for network analysis
by Conti, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
463.
|
Security for mobile networks and platforms
by Aissi, Selim | Dabbous, Nora | Prasad, Anand R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 AIS] (1).
|
|
464.
|
Delay-and Disruption-Tolerant Networking
by Farrell, Stephen | Cahill, Vinny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 004.6 FAR] (1).
|
|
465.
|
Role-Based Access Control
by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
466.
|
SSL and TLS : theory and practice
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
467.
|
How to own a shadow : the chase for Knuth
by Long, Johnny | Mullen, Timothy M | Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
|
|
468.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
469.
|
Network and system security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
470.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
471.
|
Cyber warfare : techniques, tactics and tools for security practitioners
by Andress, Jason | Winterfeld, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
|
|
472.
|
Network Simulation
by Fujimoto, Richard M | Perumalla, Kalyan S | Riley, George F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2007Availability: Items available for loan: [Call number: 004.65 FUJ] (1).
|
|
473.
|
Network coding applications
by Fragouli, Christina | Soljanin, Emina. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hanover: Now Publishers, 2007Availability: Items available for loan: [Call number: 003.5449 FRA] (1).
|
|
474.
|
Web services security development and architecture : theoretical and practical issues
by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
|
|
475.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
476.
|
Server side GPS and assisted-GPS in Java
by Harper, Neil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2010Availability: Items available for loan: [Call number: 910 HAR] (2).
|
|
477.
|
Nanoscale communication networks
by Bush, Stephen F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2010Availability: Items available for loan: [Call number: 621.38 BUS] (1).
|
|
478.
|
Cryptography for security and privacy in cloud computing
by Rass, Stefan | Slamanig, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
|
|
479.
|
Embedded Java security : security for mobile devices
by Debbabi, Mourad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).
|
|
480.
|
Network Performance Analysis: using the J programming language.
by Holt, Alan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 004.65 HOL] (1).
|