441. Peer-to-peer computing : applications, architecture, protocols and challenges

by Kwok, Yu-Kwong Ricky.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 004.652 KWO] (1).
442. Web-based and traditional outsourcing

by Sharma, Vivek | Sharma, Varun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 658.405802854678 SHA] (1).
443. Transmission techniques for emergent multicast and broadcast systems

by Silva, Mario Marques Da | Correia, Americo M. C | Dins, Rui | Souto, Nuno.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 621.382 SIL] (1).
444. Security and policy priven computing

by Liu, Lei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
445. Dynamics of information systems : theory and applications

by Hirsch, Michael J | Murphey, Robert | Pardalos, Panos M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 003.54 HIR] (1).
446. Handbook of mobile ad hoc networks for mobility models

by Roy, Radhika Ranjan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 621.3845 ROY] (1).
447. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
448. Advanced Network Programming : principles and techniques : network application programming with Java

by Ciubotaru, Bogdan | Muntean, Gabriel-Miro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2013Availability: Items available for loan: [Call number: 004.6 CIU] (1).
449. Economics of information security and privacy III

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
450. Security for cloud storage systems

by Yang, Kan | Jia, Xiaohua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
451. Intrusion detection networks : a key to collaborative security

by Fung, Carol | Boutaba, Raouf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
452. Opportunistic Mobile Social Networks

by Wu, Jie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 006.754 WUJ] (1).
453. Essential cybersecurity science : build, test, and evaluate secure systems

by Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
454. Most complex machine : A survey of computers and computing

by Eck, David J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Wellesley: A K Peters, 1995Availability: Items available for loan: [Call number: 004 ECK] (1).
455. Introduction to network security

by Krawetz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
456. Scalable and Secure Internet Services and Architecture

by Xu, Cheng zhong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
457. Performance Analysis of Queuing and Computer Networks

by Dattatreya, G. R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 004.6 DAT] (1).
458. Aspects of network and information security

by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
459. Network security architectures

by Convery, Sean | Cisco Systems, Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
460. Deploying voice over wireless LANs

by Geier, Jim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2007Availability: Items available for loan: [Call number: 621.385 GEI] (1).

Powered by Koha