|
3621.
|
Introduction to DNA self-assembled computer design
by Dwyer, Christopher L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 620.5 DWY] (1).
|
|
3622.
|
Introduction to identity-based encryption
by Martin, Luther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
|
|
3623.
|
SSL and TLS : theory and practice
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
3624.
|
How to own a shadow : the chase for Knuth
by Long, Johnny | Mullen, Timothy M | Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
|
|
3625.
|
Virtualization with Microsoft Virtual Server 2005
by Dittner, Rogier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress Publishing, 2006Availability: Items available for loan: [Call number: 005.4476 DIT] (1).
|
|
3626.
|
Practical Oracle security : your unauthorized guide to relational database security
by Shaul, Josh | Ingram, Aaron. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (1).
|
|
3627.
|
Web application vunerabilities : detect, exploit, prevent
by Cross, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
|
|
3628.
|
Best damn firewall book period
by Shinder, Thomas W. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
3629.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
3630.
|
Professional penetration testing : creating and operating a formal hacking lab
by Wilhelm, Thomas | Kanclirz, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8068 WIL] (2).
|
|
3631.
|
Network and system security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
3632.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
3633.
|
Web application obfuscation
by Heiderich, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
|
|
3634.
|
Cyber warfare : techniques, tactics and tools for security practitioners
by Andress, Jason | Winterfeld, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
|
|
3635.
|
Recognition of humans and their activities using video
by Chellappa, Rama | Roy-Chowdhury, Amit K | Zhou, S. Kevin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2005Availability: Items available for loan: [Call number: 006.4 CHE] (1).
|
|
3636.
|
Theory of timed I/O automata
by Kaynar, Dilsun K | Lynch, Nancy | Segala, Roberto | Vaandrager, Frits. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2006Availability: Items available for loan: [Call number: 004.33 KAY] (1).
|
|
3637.
|
Signal processing of random physiological signals
by Lessard, Charles S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2005Availability: Items available for loan: [Call number: 610.28 LES] (1).
|
|
3638.
|
Microcontrollers fundamentals for engineers and scientists
by Barrett, Steven F | Pack, Daniel J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2006Availability: Items available for loan: [Call number: 004.16 BAR] (1).
|
|
3639.
|
Light field sampling
by Zhang, Cha | Chen, Tsuhan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2006Availability: Items available for loan: [Call number: 006.6 ZHA] (1).
|
|
3640.
|
Introduction to logic synthesis using Verilog HDL
by Reese, Robert B | Thornton, Mitchell Aaron. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2006Availability: Items available for loan: [Call number: 621.392 REE] (1).
|