|
21.
|
Internet besieged : countering cyberspace scofflaws
by Denning, Dorothy E | Denning, Peter J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
|
|
22.
|
Ad Hoc Networking
by Perkins, Charles E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 004.6 PER] (1).
|
|
23.
|
Process of network security : designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|
|
24.
|
Mobile IP:design principles and practices
by Perkins, Charles E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 004.62 PER] (1).
|
|
25.
|
Modeling and analysis of security protocols
by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
|
|
26.
|
Art and craft of computing
by Ceri, Stefano | Mandrioli, Dino | Sbattella, Licia. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 004 CER] (1).
|
|
27.
|
Communication Netwroks : a first course
by Walrand, Jean. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 004.6 WAL] (1).
|
|
28.
|
Distributed work
by Kiesler, Sara | Hinds, Pamela. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2002Availability: Items available for loan: [Call number: 658.4036 HIN] (1).
|
|
29.
|
Know your enemy : learning about security threats
by Honeynet project. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
|
|
30.
|
Defend I.T. : security by example
by Gupta, Ajay | Laliberte, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
31.
|
Wi-Foo : the secrets of wireless hacking
by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 VLA] (1).
|
|
32.
|
High-tech crimes revealed : cyberwar stories from the digital front
by Branigan, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
33.
|
Extrusion detection : security monitoring for internal intrusions
by Bejtlich, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
|
|
34.
|
Cyberlaw : your rights in cyberspace
by Ferrera, Gerald R | August, Ray | Lichtenstein, Stephen D | Reder, Margo E. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Learning, 2001Availability: Items available for loan: [Call number: 343.7309944 FER] (1).
|
|
35.
|
Network Control and Engineering for QOS, Security and Mobility, III.
by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004.6068 GAI] (1).
|
|
36.
|
Intrusion detection and correlation : challenges and solutions
by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
37.
|
Distributed Network Systems : From Concepts to Implementations
by Jia, Weijia. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 JIA] (1).
|
|
38.
|
Web content delivery
by Tang, Xueyan | Chanson, Samuel T | Xu, Jianliang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 006.7 TAN] (1).
|
|
39.
|
Understanding intrusion detection through visualization
by Axelsson, Stefan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
|
|
40.
|
CyberLaw
by Rosenoer, Jonathan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1997Availability: Items available for loan: [Call number: 347.303999 ROS] (1).
|