|
281.
|
Trust and risk in Internet commerce
by Camp, L. Jean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
282.
|
City of bits : space, place and the infobahn
by Mitchell, William J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: MIT Press, 2000Availability: Items available for loan: [Call number: 303.4833 MIT] (1).
|
|
283.
|
E-Topia
by Mitchell, William J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: MIT Press, 1999Availability: Items available for loan: [Call number: 303.48 MIT] (1).
|
|
284.
|
Wealth of networks : how social production transforms markets and freedom
by Benkler, Yochai. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Haven: Yale University Press, 2006Availability: Items available for loan: [Call number: 303.4833 BEN] (1).
|
|
285.
|
Mobile IP : present state and future
by Mondal, Abdul Sakib. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New york: Kluwer Academic, 2003Availability: Items available for loan: [Call number: 004.62 MON] (1).
|
|
286.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|
|
287.
|
Art of software security testing : identifying software security flaws
by Wysopal, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
|
|
288.
|
How to break Web software : functional and security testing of Web applications and Web services
by Andrews, Mike | Whittaker, James A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
|
|
289.
|
Craft of system security
by Smith, Sean | Marchesini, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
290.
|
Fuzzing : brute force vulnerabilty discovery
by Sutton, Michael | Amini, Pedram | Greene, Adam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
|
|
291.
|
Computer networking : a top-down approach
by Kurose, James F | Ross, Keith W. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 004.678 KUR] (1).
|
|
292.
|
Chained exploits : advanced hacking attacks from start to finish
by Whitaker, Andrew | Evans, Keatron | Voth, Jack B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
293.
|
Succeeding with SOA : realizing business value through total architecture
by Brown, Paul C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 004.22 BRO] (1).
|
|
294.
|
Mathematical Foundations of Computer Networking
by Keshav, Srinivasan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2013Availability: Items available for loan: [Call number: 004.601519 KES] (1).
|
|
295.
|
Practice of Cloud System Administration : designing and operating large distributed systems, Vol 2.
by Limonceli, Thomas A | Chalup, Strata R | Hogan, Christina J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2015Availability: Items available for loan: [Call number: 004.6782068 LIM] (1).
|
|
296.
|
Access control systems : security, identity management and trust models
by Benantar, Messaoud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
|
|
297.
|
Grid enabled remote instrumentation
by Davoli, F | Meyer, Norbert | Pugliese, R | Zappatore, S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 004.36 DAV] (1).
|
|
298.
|
Advances in queueing theory and network applications
by Wuyi, Yue | Takagi, Hideaki | Takahashi,Yutaka. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 519.82 WUY] (1).
|
|
299.
|
Global initiatives to secure cyberspace : an emerging landscape
by Portnoy, Michael | Goodman, Seymour E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
|
|
300.
|
Reliable distributed systems : technologies, web services, and applications
by Birman, Kenneth P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004.6 BIR] (1).
|