|
481.
|
Guide to wireless ad hoc networks
by Misra, Sudip | Misra, Subhas Chandra | Woungang, Isaac. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 621.382 MIS] (1).
|
|
482.
|
Guide to computer network security
by Kizza, Joseph Migga. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
483.
|
Game theoretic problems in network economics and mechanism design solutions
by Narahari, Y | Narahari, Y. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 004.6 NAR] (1).
|
|
484.
|
Intrusion detection : a machine learning approach
by Yu, Zhenwei | Tsai, Jeffrey J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
|
|
485.
|
Wireless ad hoc and sensor networks
by Labiod, Houda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: ISTE Ltd, 2008Availability: Items available for loan: [Call number: 621.3821 LAB] (1).
|
|
486.
|
Dynamic business process formation for instant virtual enterprises
by Mehandjiev, Nikolay | Grefen, Paul. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 658.4038 MEH] (1).
|
|
487.
|
Algorithms for next generation networks
by Thottan, Marina | Cormode, Graham. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2010Availability: Items available for loan: [Call number: 005.1 COR] (1).
|
|
488.
|
Professional ASP. NET security
by Basiura, Russ | Conway, Richard | Gaster, Brady | Kent, Dan | Kent, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.754 BAS] (1).
|
|
489.
|
Computer networks
by Irving, Philip J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Lexden Publishing, 2006Availability: Items available for loan: [Call number: 004.6 IRV] (1).
|
|
490.
|
Event processing in action
by Etzion, Opher | Niblett, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Greenwich: Manning Publications, 2011Availability: Items available for loan: [Call number: 004.682 ETZ] (1).
|
|
491.
|
Conversations about challenges in computing
by Bruaset, Are Magnus | Tveito, Aslak. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2013Availability: Items available for loan: [Call number: 003 BRU] (1).
|
|
492.
|
Applications of social media and social network analysis
by Chawla, Nitesh V | Kazienko, Przemyslaw. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 004.6 KAZ] (1).
|
|
493.
|
Management of Multimedia Networks and Services: 6th IFIP/IEEE International Conference, MMNS 2003 Belfast, Northern Ireland, UK, September 7-10, 2003: Proceedings
by Marshall, Alan | Agoulmine, Nazim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 MAR] (1).
|
|
494.
|
Composition of Secure Multi-Party Protocols : Comprehensive Study
by Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
|
|
495.
|
Performance analysis of network architectures
by Tutsch, Dietmar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2006Availability: Items available for loan: [Call number: 621.38215 TUT] (1).
|
|
496.
|
Introduction to cryptography : principles and applications
by Delfs, Hans | Knebl, Helmut. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|
|
497.
|
Formal correctness of security protocols
by Bella, Giampaolo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
|
|
498.
|
Dissemination of information in optical networks : from technology to algorithms
by Bandyopadhyay, Subir | Klasing, Ralf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 621.3827 BAN] (1).
|
|
499.
|
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings
by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
|
|
500.
|
Ontologies-based business integration
by Rebstock, Michael | Fengel, Janina | Paulheim, Heiko. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2008Availability: Items available for loan: [Call number: 658.872 REB] (1).
|