|
441.
|
Peer-to-peer computing : applications, architecture, protocols and challenges
by Kwok, Yu-Kwong Ricky. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 004.652 KWO] (1).
|
|
442.
|
Web-based and traditional outsourcing
by Sharma, Vivek | Sharma, Varun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 658.405802854678 SHA] (1).
|
|
443.
|
Transmission techniques for emergent multicast and broadcast systems
by Silva, Mario Marques Da | Correia, Americo M. C | Dins, Rui | Souto, Nuno. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 621.382 SIL] (1).
|
|
444.
|
Security and policy priven computing
by Liu, Lei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
445.
|
Dynamics of information systems : theory and applications
by Hirsch, Michael J | Murphey, Robert | Pardalos, Panos M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 003.54 HIR] (1).
|
|
446.
|
Handbook of mobile ad hoc networks for mobility models
by Roy, Radhika Ranjan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 621.3845 ROY] (1).
|
|
447.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
448.
|
Advanced Network Programming : principles and techniques : network application programming with Java
by Ciubotaru, Bogdan | Muntean, Gabriel-Miro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2013Availability: Items available for loan: [Call number: 004.6 CIU] (1).
|
|
449.
|
Economics of information security and privacy III
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
450.
|
Security for cloud storage systems
by Yang, Kan | Jia, Xiaohua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
|
|
451.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
452.
|
Opportunistic Mobile Social Networks
by Wu, Jie. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 006.754 WUJ] (1).
|
|
453.
|
Essential cybersecurity science : build, test, and evaluate secure systems
by Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
|
|
454.
|
Most complex machine : A survey of computers and computing
by Eck, David J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Wellesley: A K Peters, 1995Availability: Items available for loan: [Call number: 004 ECK] (1).
|
|
455.
|
Introduction to network security
by Krawetz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
|
|
456.
|
Scalable and Secure Internet Services and Architecture
by Xu, Cheng zhong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
|
|
457.
|
Performance Analysis of Queuing and Computer Networks
by Dattatreya, G. R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 004.6 DAT] (1).
|
|
458.
|
Aspects of network and information security
by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
|
|
459.
|
Network security architectures
by Convery, Sean | Cisco Systems, Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
460.
|
Deploying voice over wireless LANs
by Geier, Jim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2007Availability: Items available for loan: [Call number: 621.385 GEI] (1).
|