|
41.
|
Wireless communications systems and networks
by Guizani, Mohsen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Kluwer Academic Publishers, 2004Availability: Items available for loan: [Call number: 621.382 GUI] (1).
|
|
42.
|
Sociology of community connections
by Bruhn, John G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 307 BRU] (1).
|
|
43.
|
Know your enemy : learning about security threats
by Honeynet project. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
|
|
44.
|
Defend I.T. : security by example
by Gupta, Ajay | Laliberte, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
45.
|
Wi-Foo : the secrets of wireless hacking
by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 VLA] (1).
|
|
46.
|
High-tech crimes revealed : cyberwar stories from the digital front
by Branigan, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
47.
|
Extrusion detection : security monitoring for internal intrusions
by Bejtlich, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
|
|
48.
|
Cyberlaw : your rights in cyberspace
by Ferrera, Gerald R | August, Ray | Lichtenstein, Stephen D | Reder, Margo E. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Learning, 2001Availability: Items available for loan: [Call number: 343.7309944 FER] (1).
|
|
49.
|
Advances in pervasive computing and networking
by Szymanski, Boleslaw K | Yener, Bulent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004.22 SZY] (1).
|
|
50.
|
Network Control and Engineering for QOS, Security and Mobility, III.
by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004.6068 GAI] (1).
|
|
51.
|
Intrusion detection and correlation : challenges and solutions
by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
52.
|
Resource management in wireless networking
by Cardei, Mihaela | Cardei, Ionut | Du, Ding-Zhu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.384 CAR] (1).
|
|
53.
|
Distributed Network Systems : From Concepts to Implementations
by Jia, Weijia. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 JIA] (1).
|
|
54.
|
Web content delivery
by Tang, Xueyan | Chanson, Samuel T | Xu, Jianliang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 006.7 TAN] (1).
|
|
55.
|
New horizons of parallel and distributed computing
by Guo, Minyi | Yang, Laurence Tianruo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004.35 GUO] (1).
|
|
56.
|
Understanding intrusion detection through visualization
by Axelsson, Stefan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
|
|
57.
|
Security for wireless sensor networks
by Liu, Donggang | Ning, Peng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 681.2 LIU] (1).
|
|
58.
|
Introduction to artificial life
by Adami, Christoph. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 1998Availability: Items available for loan: [Call number: 570.13 ADA] (2).
|
|
59.
|
CyberLaw
by Rosenoer, Jonathan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1997Availability: Items available for loan: [Call number: 347.303999 ROS] (1).
|
|
60.
|
Bayesian networks and decision graphs
by Jensen, Finn V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 519.542 JEN] (1).
|