|
561.
|
Computer Networks and Internets : with internet applications
by Comer, Douglas E | Narayanan, M. S. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2008Availability: Items available for loan: [Call number: 004.6 COM] (2).
|
|
562.
|
Network Simulation Experiments Manual
by Aboelela, Emad. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2004Availability: Items available for loan: [Call number: 004.65 ABO] (1).
|
|
563.
|
Understanding TCP/IP : a clear and comprehensive guide to TCP/IP protocols
by Kabelova, Alena | Dostalek, Libor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 004.62 DOS] (1).
|
|
564.
|
SSH, the secure shell : the definitive guide
by Barrett, Daniel J | Byrnes, Robert G | Silverman, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (1).
|
|
565.
|
Beautiful security : leading security experts explain how they think
by Oram, Andy | Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Beijing: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 ORA] (1).
|
|
566.
|
Cloud security and privacy : an enterprise perspective on risks and compliance
by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Shroff Publishers, 2009Availability: Items available for loan: [Call number: 005.8 MAT] (1).
|
|
567.
|
Computer networks
by Vijayakumar, B. P | Manvi, Sunilkumar S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2009Availability: Items available for loan: [Call number: 004.6 MAN] (1).
|
|
568.
|
Network security : issues, challenges and techniques
by Bhattacharyya, Dhruba K | Sarma, Nityananda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 SAR] (1).
|
|
569.
|
Computer Networks
by Tanenbaum, Andrew S. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2013Availability: Items available for loan: [Call number: 004.6 TAN] (6).
|
|
570.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 6th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 005.82 STA] (2).
|
|
571.
|
Data and Computer Communications
by Stallings, William. Edition: 9th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2014Availability: Items available for loan: [Call number: 004.6 STA] (1).
|
|
572.
|
Computer Networks : a systems approach
by Peterson, Larry L | Davie, Bruce S. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2012Availability: Items available for loan: [Call number: 004.6 PET] (7).
|
|
573.
|
Networks for pervasive services : six ways to upgrade the Internet
by Liotta, Antonio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2011Availability: Items available for loan: [Call number: 004.678 LIO] (1).
|
|
574.
|
Trust and security in collaborative computing
by Zou, Xukai | Dai, Yuan-Shun | Pan, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2008Availability: Items available for loan: [Call number: 005.8 ZOU] (1).
|
|
575.
|
Security in AD-HOC and sensor networks
by Beyah, Raheem. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2009Availability: Items available for loan: [Call number: 005.8 BEY] (1).
|
|
576.
|
Network Recovery : protection and restoration of optical, SONET-SDH, IP, and MPLS
by Demeester, Piet | Pickavet, Mario | Vasseur, Jean-Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2004Availability: Items available for loan: [Call number: 004.6068 VAS] (1).
|
|
577.
|
Principles of Database Systems with Internet and Java Applications
by Riccardi, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.74 RIC] (1).
|
|
578.
|
CERT guide to system and network security practices
by Allen, Julia H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
|
|
579.
|
Shaping the network society : the new role of civic society in cyberspace
by Schuler, Douglas | Day, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: MIT Press, 2004Availability: Items available for loan: [Call number: 303.4833 SCH] (1).
|
|
580.
|
VPNs illustrated : tunnels, VPNs, and IPsec
by Snader, Jon C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 004.678 SNA] (1).
|