|
1.
|
Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations
by Datta, Anupam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.8 DAT] (1).
|
|
2.
|
TCP/IP protocol suite
by Forouzan, Behrouz A. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill Education, 2006Availability: Items available for loan: [Call number: 004.62 FOR] (1).
|
|
3.
|
Routing, flow, and capacity design in communication and computer networks
by Pioro, Michal | Medhi, Deepankar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2004Availability: Items available for loan: [Call number: 004.66 PIO] (1).
|
|
4.
|
ASN.1 communication between heterogeneous systems
by Dubuisson, Olivier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 004.35 DUB] (1).
|
|
5.
|
Java 2 network security
by Pistoia, Marco. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
|
|
6.
|
Essential guide to computing
by Walters, E. Garrison. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 004 WAL] (1).
|
|
7.
|
Network Management : concepts and practice, a hands-on approach
by Burke, J. Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 004.6068 BUR] (2).
|
|
8.
|
Data communications and computer networks
by Duck, Michael | Read, Richard. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 DUC] (1).
|
|
9.
|
Networking
by Beasley, Jeffrey S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Ohio: Prentice Hall, 2004Availability: Items available for loan: [Call number: 004.6 BEA] (2).
|
|
10.
|
Network distributed computing : fitscapes and fallacies
by Goff, Max K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 GOF] (1).
|
|
11.
|
Malware : fighting malicious code
by Skoudis, Ed | Zeltser, Lenny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|
|
12.
|
Optimizing Network Performance with Content Switching : server, firewall and cache load balancing.
by Syme, Matthew | Goldie, Philip. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 SYM] (1).
|
|
13.
|
Introduction to operating systems and networks
by Watson, Ruth A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Pearson Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.4469 WAT] (1).
|
|
14.
|
On demand computing : technologies and strategies
by Fellenstein, Craig. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: IBM Press, 2003Availability: Items available for loan: [Call number: 004 FEL] (1).
|
|
15.
|
Internet denial of service : attack and defense mechanisms
by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
|
|
16.
|
Building N1 grid solutions : preparing, architecting, and implementing service-centric data centers
by Carolan, Jason | Radeztsky, Scott | Strong, Paul | Turner, Ed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: Sun Microsystems Press, 2004Availability: Items available for loan: [Call number: 004.0684 CAR] (1).
|
|
17.
|
Firewalls and VPNs : principles and practices
by Tibbs, Richard | Oakes, Edward. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
|
|
18.
|
Protecting critical infrastructures against cyber-attack
by Goodman, Seymour E | Longhurst,David W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
|
|
19.
|
Parliament in the age of the Internet
by Coleman, Stephen | Donk, Wim Van De | Taylor, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Oxford: Oxford University Press, 1999Availability: Items available for loan: [Call number: 328 COL] (1).
|
|
20.
|
Networks of innovation : change and meaning in the age of the Internet
by Tuomi, Ilkka. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2002Availability: Items available for loan: [Call number: 303.483 TUO] (1).
|