281. Trust and risk in Internet commerce

by Camp, L. Jean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
282. City of bits : space, place and the infobahn

by Mitchell, William J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: MIT Press, 2000Availability: Items available for loan: [Call number: 303.4833 MIT] (1).
283. E-Topia

by Mitchell, William J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: MIT Press, 1999Availability: Items available for loan: [Call number: 303.48 MIT] (1).
284. Wealth of networks : how social production transforms markets and freedom

by Benkler, Yochai.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Haven: Yale University Press, 2006Availability: Items available for loan: [Call number: 303.4833 BEN] (1).
285. Mobile IP : present state and future

by Mondal, Abdul Sakib.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New york: Kluwer Academic, 2003Availability: Items available for loan: [Call number: 004.62 MON] (1).
286. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
287. Art of software security testing : identifying software security flaws

by Wysopal, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
288. How to break Web software : functional and security testing of Web applications and Web services

by Andrews, Mike | Whittaker, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
289. Craft of system security

by Smith, Sean | Marchesini, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
290. Fuzzing : brute force vulnerabilty discovery

by Sutton, Michael | Amini, Pedram | Greene, Adam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
291. Computer networking : a top-down approach

by Kurose, James F | Ross, Keith W.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 004.678 KUR] (1).
292. Chained exploits : advanced hacking attacks from start to finish

by Whitaker, Andrew | Evans, Keatron | Voth, Jack B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
293. Succeeding with SOA : realizing business value through total architecture

by Brown, Paul C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 004.22 BRO] (1).
294. Mathematical Foundations of Computer Networking

by Keshav, Srinivasan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida: Pearson Education, 2013Availability: Items available for loan: [Call number: 004.601519 KES] (1).
295. Practice of Cloud System Administration : designing and operating large distributed systems, Vol 2.

by Limonceli, Thomas A | Chalup, Strata R | Hogan, Christina J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2015Availability: Items available for loan: [Call number: 004.6782068 LIM] (1).
296. Access control systems : security, identity management and trust models

by Benantar, Messaoud.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
297. Grid enabled remote instrumentation

by Davoli, F | Meyer, Norbert | Pugliese, R | Zappatore, S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 004.36 DAV] (1).
298. Advances in queueing theory and network applications

by Wuyi, Yue | Takagi, Hideaki | Takahashi,Yutaka.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 519.82 WUY] (1).
299. Global initiatives to secure cyberspace : an emerging landscape

by Portnoy, Michael | Goodman, Seymour E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
300. Reliable distributed systems : technologies, web services, and applications

by Birman, Kenneth P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004.6 BIR] (1).

Powered by Koha