|
1.
|
Security in fixed and wireless networks : an introduction to securing data communications
by Schafer, Gunter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
2.
|
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security
by Chandra, Praphul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Newnes, 2005Availability: Items available for loan: [Call number: 005.8 CHA] (1).
|
|
3.
|
Wireless communications security
by Imai, Hideki | Kobara, Kazukuni | Rahman, Mohammad Ghulam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 IMA] (1).
|
|
4.
|
Security in wireless LANs and MANs
by Hardjono, Thomas | Dondeti, Lakshminath R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
5.
|
802.11 security
by Potter, Bruce | Fleck, Bob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 POT] (1).
|
|
6.
|
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny | Liu, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
|
|
7.
|
Data communications and network security
by Carr, Houston H | Snyder, Charles A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAR] (1).
|
|
8.
|
Wireless networks : multiuser detection in cross-layer design
by Mandayam, Narayan B | Comaniciu, Cristina | Poor, H. Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.3821 COM] (1).
|
|
9.
|
Wireless network security
by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
|
|
10.
|
Secure localization and time synchronization for wireless sensor and ad hoc networks
by Poovendran, Radha. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 681.2 POO] (1).
|
|
11.
|
Wireless Communications : 2007 CNIT Thyrrenian Symposium
by Puppolin, Silvano. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 621.38438 PUP] (1).
|
|
12.
|
Securing emerging wireless systems : lower-layer approaches
by Chen, Yingying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 621.384 CHE] (1).
|
|
13.
|
Guide to wireless network security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
14.
|
Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise
by Hoffman, Daniel V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
|
|
15.
|
UMTS security
by Niemi, Valtteri | Nyberg, Kaisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
|
|
16.
|
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
by Buttyan, Levente | Hubaux, Jean-Pierre. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
|
|
17.
|
Security of mobile communications
by Boudriga, Noureddine. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2010Availability: Items available for loan: [Call number: 621.384 BOU] (1).
|
|
18.
|
Resource, mobility, and security management in wireless networks and mobile communications
by Zhang, Yan | Fujise, Masayuki | Hu, Honglin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 621.384 ZHA] (1).
|
|
19.
|
Security in wireless mesh networks
by Zhang, Yan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 ZHA] (1).
|
|
20.
|
Wireless security and cryptography : specifications and implementations
by Zhang, Xinmiao | Sklavos, Nicolas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 SKL] (1).
|