341. Security and policy priven computing

by Liu, Lei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
342. Introduction to unmanned aircraft systems

by Barnhart, Richard K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 623.7469 BAR] (1).
343. Classical feedback control with MATLAB and Simulink

by Enright, Paul J | Lurie, Boris J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 629.83028553 LUR] (1).
344. Adaptive cryptographic access control : foreword by Sylvia L. Osborn.

by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
345. Preserving privacy in data outsourcing

by Foresti, Sara.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
346. Optimal and robust control : advanced topics with MATLAB

by Fortuna, Luigi | Frasca, Mattia.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 629.8 FOR] (1).
347. Intrusion detection networks : a key to collaborative security

by Fung, Carol | Boutaba, Raouf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
348. Optimal control applied to biological models

by Lenhart, Suzanne | Workman, John T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 570.151 LEN] (1).
349. Access control, security, and trust : a logical approach

by Older, Susan | Chin, Shiu-Kai.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 CHI] (1).
350. Advances in applied artificial intelligence

by Fulcher, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 006.3 FUL] (1).
351. Linux firewalls : attack detection and response with iptables, psad, and fwsnort

by Rash, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 RAS] (1).
352. Service assurance for voice over WiFi and 3G networks

by Lau, Richard | Chang, William Y | Khare, Ram.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 384.534 LAU] (1).
353. Role-Based Access Control

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
354. Theory of timed I/O automata

by Kaynar, Dilsun K | Lynch, Nancy | Segala, Roberto | Vaandrager, Frits.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Rafael: Morgan & Claypool Publishers, 2006Availability: Items available for loan: [Call number: 004.33 KAY] (1).
355. Formal models and techniques for analyzing security protocols

by Cortier, Veronique | Kremer, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
356. Net delusion : the dark side of internet freedom

by Morozov, Evgeny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: PublicAffairs, 2011Availability: Items available for loan: [Call number: 303.4833 MOR] (1).
357. Control and optimization with differential-algebraic constraints

by Biegler, Lorenz T | Campbell, S. L | Mehrmann, V. L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Philadelphia: Society For Industrial And Applied Mathematics, 2012Availability: Items available for loan: [Call number: 512.56 BIE] (1).
358. Applications to regular and bang-bang control : second-order necessary and sufficient optimality conditions in calculus of variations and optimal control

by Osmolovskii, N. P | Maurer, Helmut.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Philadelphia: Society For Industrial And Applied Mathematics, 2012Availability: Items available for loan: [Call number: 515.64 OSM] (1).
359. Mathematical models for communicable diseases

by Brauer, Fred | Castillo-Chavez, Carlos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Philadelphia: Society for Industrial and Applied Mathematics, 2013Availability: Items available for loan: [Call number: 616.9015118 BRA] (1).
360. Net delusion : how not to liberate the world

by Morozov, Evgeny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Allen Lane, 2011Availability: Items available for loan: [Call number: 303.4833 MOR] (1).

Powered by Koha