|
1.
|
Internet denial of service : attack and defense mechanisms
by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
|
|
2.
|
Protecting critical infrastructures against cyber-attack
by Goodman, Seymour E | Longhurst,David W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
|
|
3.
|
Humanscale 7/8/9 : portfolio of information
by Diffrient, Niels | Harman, David | Tilley, Alvin R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 1991Availability: Items available for loan: [Call number: 620.82 DIF] (1).
|
|
4.
|
High-tech crimes revealed : cyberwar stories from the digital front
by Branigan, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
5.
|
Beyond fear : thinking sensibly about security in an uncertain world
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Copernicus Books, 2003Availability: Items available for loan: [Call number: 363.3221 SCH] (1).
|
|
6.
|
9/11 commission report : final report of the national commission on terrorist attacks upon the United States
by Hamilton, Lee H | Ben-Veniste, Richard | Kean, Thomas H | Kerrey, Bob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: W. W. Norton & Company, 2004Availability: Items available for loan: [Call number: 973.931 KEA] (1).
|
|
7.
|
Phishing and countermeasures : understanding the increasing problem of electronic identity theft
by Jakobsson, Markus | Myers, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 364.163 JAK] (1).
|
|
8.
|
Malicious cryptography : exposing cryptovirology
by Young, Adam | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
|
|
9.
|
Countering the new terrorism
by Lesser, Ian O | Arquilla, John | Hoffman, Bruce | Ronfeldt, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Santa Monica: RAND, 1999Availability: Items available for loan: [Call number: 303.625 LES] (1).
|
|
10.
|
Communicable disease : epidemiology and control
by Webber, Roger. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: CABI, 1996Availability: Items available for loan: [Call number: 616.9 WEB] (1).
|
|
11.
|
Design criteria for low distortion in feedback opamp circuits
by Saether, Trond | Hernes, Bjornar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 621.395 HER] (1).
|
|
12.
|
Parasitic-aware optimization of CMOS RF circuits
by Allstot, David J | Choi, Kiyong | Park, Jinho. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2003Availability: Items available for loan: [Call number: 621.38412 ALL] (1).
|
|
13.
|
Multi-threshold CMOS digital circuits : managing leakage power
by Elmasry, Mohamed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic, 2003Availability: Items available for loan: [Call number: 621.39732 ANI] (1).
|
|
14.
|
Protect Your Child on the Internet : a parent's toolkit
by Lenardon, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Viva Books, 2007Availability: Items available for loan: [Call number: 004.6780289 LEN] (2).
|
|
15.
|
Waste minimization : a practical guide to cleaner production and enhanced profitability
by Modak, Prasad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Ahmedabad: Centre for Environment Education, 1995Availability: Items available for loan: [Call number: 363.728 MOD] (1).
|
|
16.
|
Safe : the race to protect ourselves in a newly dangerous world
by Baer, Martha | Heron, Katrina | Morton, Oliver | Ratliff, Evan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: HarperCollins, 2005Availability: Items available for loan: [Call number: 363.32 BAE] (1).
|
|
17.
|
Endangered species : how we can avoid mass destruction and build a lasting peace
by Younger, Stephen Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: HarperPerennial, 2008Availability: Items available for loan: [Call number: 303.6 YOU] (1).
|
|
18.
|
Cyber attacks : protecting national infrastructure
by Amoroso, Edward G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Butterworth-Heinemann, 2011Availability: Items available for loan: [Call number: 363.32590046780973 AMO] (1).
|
|
19.
|
Software IP detective's handbook : measurement, comparison, and infringement detection
by Zeidman, Robert. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 346.048 ZEI] (1).
|
|
20.
|
White man's burden : why the West's efforts to aid the rest have done so much ill and so little good
by Easterly, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Penguin Books, 2007Availability: Items available for loan: [Call number: 338.911713 EAS] (1).
|