41. Wireless communications systems and networks

by Guizani, Mohsen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Kluwer Academic Publishers, 2004Availability: Items available for loan: [Call number: 621.382 GUI] (1).
42. Sociology of community connections

by Bruhn, John G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 307 BRU] (1).
43. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
44. Defend I.T. : security by example

by Gupta, Ajay | Laliberte, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
45. Wi-Foo : the secrets of wireless hacking

by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 VLA] (1).
46. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
47. Extrusion detection : security monitoring for internal intrusions

by Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
48. Cyberlaw : your rights in cyberspace

by Ferrera, Gerald R | August, Ray | Lichtenstein, Stephen D | Reder, Margo E. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Learning, 2001Availability: Items available for loan: [Call number: 343.7309944 FER] (1).
49. Advances in pervasive computing and networking

by Szymanski, Boleslaw K | Yener, Bulent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004.22 SZY] (1).
50. Network Control and Engineering for QOS, Security and Mobility, III.

by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004.6068 GAI] (1).
51. Intrusion detection and correlation : challenges and solutions

by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
52. Resource management in wireless networking

by Cardei, Mihaela | Cardei, Ionut | Du, Ding-Zhu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.384 CAR] (1).
53. Distributed Network Systems : From Concepts to Implementations

by Jia, Weijia.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 JIA] (1).
54. Web content delivery

by Tang, Xueyan | Chanson, Samuel T | Xu, Jianliang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 006.7 TAN] (1).
55. New horizons of parallel and distributed computing

by Guo, Minyi | Yang, Laurence Tianruo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004.35 GUO] (1).
56. Understanding intrusion detection through visualization

by Axelsson, Stefan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
57. Security for wireless sensor networks

by Liu, Donggang | Ning, Peng.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 681.2 LIU] (1).
58. Introduction to artificial life

by Adami, Christoph.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 1998Availability: Items available for loan: [Call number: 570.13 ADA] (2).
59. CyberLaw

by Rosenoer, Jonathan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1997Availability: Items available for loan: [Call number: 347.303999 ROS] (1).
60. Bayesian networks and decision graphs

by Jensen, Finn V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 519.542 JEN] (1).

Powered by Koha