|
381.
|
Control techniques for complex networks
by Meyn, Sean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 004.6 MEY] (1).
|
|
382.
|
Digital identity management : technological, business, and social implications
by Birch, David G. W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
|
|
383.
|
Security monitoring
by Fry, Chris | Nystrom, Martin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 FRY] (1).
|
|
384.
|
Networking basics
by Ciampa, Mark. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2003Availability: Items available for loan: [Call number: 004.6 CIA] (1).
|
|
385.
|
Web security for network and system administrators
by Mackey, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
|
|
386.
|
Lab manual for Security+ guide to network security fundamentals
by Cretaro, Paul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
|
|
387.
|
Understanding PKI: Concepts, standards and deployment considerations
by Adams, Carlisle | Lloyd, Steve. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
|
|
388.
|
Structure and dynamics of networks
by Newman, Mark | Barabasi, Albert-Laszlo | Watts, Duncan J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton: Princeton University Press, 2006Availability: Items available for loan: [Call number: 384.54065 NEW] (1).
|
|
389.
|
Microsoft windows security resource kit
by Smith, Ben | Komar, Brian | Smith, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
|
|
390.
|
WirelessMAN : inside the IEEE 802.16 standard for wireless metropolitan area networks
by Eklund, Carl. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Press, 2006Availability: Items available for loan: [Call number: 621.384 EKL] (1).
|
|
391.
|
Cybersociety 2.0 : Revisiting computer-mediated communication and compnay
by Jones | Jones, Steven G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Sage Publications, 1998Availability: Items available for loan: [Call number: 303.4833 JON] (1).
|
|
392.
|
Readings in cyberethics
by Tavani, Herman T | Spinello, Richard A. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2004Availability: Items available for loan: [Call number: 175 SPI] (1).
|
|
393.
|
Information security : contemporary cases
by Wright, Marie A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
|
|
394.
|
Computer security : protecting digital resources
by Newman, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
|
|
395.
|
Release 2.1 : a design for living in the digital age
by Dyson, Esther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Broadway Books, 1998Availability: Items available for loan: [Call number: 303.4833 DYS] (1).
|
|
396.
|
Telecommunications network management into the 21st century : techniques, standards, technologies, and applications
by Aidarous, Salah | Plevyak, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Press, 1995Availability: Items available for loan: [Call number: 621.382 AID] (1).
|
|
397.
|
Culture of the Internet
by Kiesler, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Lawrence Erlbaum Associates, 1997Availability: Items available for loan: [Call number: 302.23 KIE] (1).
|
|
398.
|
Communication and Computer Networks : modelling with discrete-time queues
by Woodward, Michael E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Los Alamitos: IEEE Computer Society Press, 1994Availability: Items available for loan: [Call number: 004.60151982 WOO] (1).
|
|
399.
|
Network modeling, simulation and analysis
by Garzia, Ricardo F | Garzia, Mario R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Marcel Dekker, 1990Availability: Items available for loan: [Call number: 004.6 GAR] (1).
|
|
400.
|
Network Design : management and technical perspectives
by Piliouras, Teresa C. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2004Availability: Items available for loan: [Call number: 004.6 PIL] (1).
|