|
341.
|
Security and policy priven computing
by Liu, Lei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
342.
|
Introduction to unmanned aircraft systems
by Barnhart, Richard K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 623.7469 BAR] (1).
|
|
343.
|
Classical feedback control with MATLAB and Simulink
by Enright, Paul J | Lurie, Boris J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 629.83028553 LUR] (1).
|
|
344.
|
Adaptive cryptographic access control : foreword by Sylvia L. Osborn.
by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
|
|
345.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
346.
|
Optimal and robust control : advanced topics with MATLAB
by Fortuna, Luigi | Frasca, Mattia. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 629.8 FOR] (1).
|
|
347.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
348.
|
Optimal control applied to biological models
by Lenhart, Suzanne | Workman, John T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 570.151 LEN] (1).
|
|
349.
|
Access control, security, and trust : a logical approach
by Older, Susan | Chin, Shiu-Kai. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 CHI] (1).
|
|
350.
|
Advances in applied artificial intelligence
by Fulcher, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2006Availability: Items available for loan: [Call number: 006.3 FUL] (1).
|
|
351.
|
Linux firewalls : attack detection and response with iptables, psad, and fwsnort
by Rash, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 RAS] (1).
|
|
352.
|
Service assurance for voice over WiFi and 3G networks
by Lau, Richard | Chang, William Y | Khare, Ram. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 384.534 LAU] (1).
|
|
353.
|
Role-Based Access Control
by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
354.
|
Theory of timed I/O automata
by Kaynar, Dilsun K | Lynch, Nancy | Segala, Roberto | Vaandrager, Frits. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2006Availability: Items available for loan: [Call number: 004.33 KAY] (1).
|
|
355.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
356.
|
Net delusion : the dark side of internet freedom
by Morozov, Evgeny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: PublicAffairs, 2011Availability: Items available for loan: [Call number: 303.4833 MOR] (1).
|
|
357.
|
Control and optimization with differential-algebraic constraints
by Biegler, Lorenz T | Campbell, S. L | Mehrmann, V. L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Philadelphia: Society For Industrial And Applied Mathematics, 2012Availability: Items available for loan: [Call number: 512.56 BIE] (1).
|
|
358.
|
Applications to regular and bang-bang control : second-order necessary and sufficient optimality conditions in calculus of variations and optimal control
by Osmolovskii, N. P | Maurer, Helmut. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Philadelphia: Society For Industrial And Applied Mathematics, 2012Availability: Items available for loan: [Call number: 515.64 OSM] (1).
|
|
359.
|
Mathematical models for communicable diseases
by Brauer, Fred | Castillo-Chavez, Carlos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Philadelphia: Society for Industrial and Applied Mathematics, 2013Availability: Items available for loan: [Call number: 616.9015118 BRA] (1).
|
|
360.
|
Net delusion : how not to liberate the world
by Morozov, Evgeny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Allen Lane, 2011Availability: Items available for loan: [Call number: 303.4833 MOR] (1).
|