481. Guide to wireless ad hoc networks

by Misra, Sudip | Misra, Subhas Chandra | Woungang, Isaac.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 621.382 MIS] (1).
482. Guide to computer network security

by Kizza, Joseph Migga.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
483. Game theoretic problems in network economics and mechanism design solutions

by Narahari, Y | Narahari, Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 004.6 NAR] (1).
484. Intrusion detection : a machine learning approach

by Yu, Zhenwei | Tsai, Jeffrey J. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
485. Wireless ad hoc and sensor networks

by Labiod, Houda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: ISTE Ltd, 2008Availability: Items available for loan: [Call number: 621.3821 LAB] (1).
486. Dynamic business process formation for instant virtual enterprises

by Mehandjiev, Nikolay | Grefen, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 658.4038 MEH] (1).
487. Algorithms for next generation networks

by Thottan, Marina | Cormode, Graham.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2010Availability: Items available for loan: [Call number: 005.1 COR] (1).
488. Professional ASP. NET security

by Basiura, Russ | Conway, Richard | Gaster, Brady | Kent, Dan | Kent, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2002Availability: Items available for loan: [Call number: 005.754 BAS] (1).
489. Computer networks

by Irving, Philip J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Lexden Publishing, 2006Availability: Items available for loan: [Call number: 004.6 IRV] (1).
490. Event processing in action

by Etzion, Opher | Niblett, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Greenwich: Manning Publications, 2011Availability: Items available for loan: [Call number: 004.682 ETZ] (1).
491. Conversations about challenges in computing

by Bruaset, Are Magnus | Tveito, Aslak.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2013Availability: Items available for loan: [Call number: 003 BRU] (1).
492. Applications of social media and social network analysis

by Chawla, Nitesh V | Kazienko, Przemyslaw.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 004.6 KAZ] (1).
493. Management of Multimedia Networks and Services: 6th IFIP/IEEE International Conference, MMNS 2003 Belfast, Northern Ireland, UK, September 7-10, 2003: Proceedings

by Marshall, Alan | Agoulmine, Nazim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 MAR] (1).
494. Composition of Secure Multi-Party Protocols : Comprehensive Study

by Lindell, Yehuda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
495. Performance analysis of network architectures

by Tutsch, Dietmar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2006Availability: Items available for loan: [Call number: 621.38215 TUT] (1).
496. Introduction to cryptography : principles and applications

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
497. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
498. Dissemination of information in optical networks : from technology to algorithms

by Bandyopadhyay, Subir | Klasing, Ralf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 621.3827 BAN] (1).
499. Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007 : proceedings

by Kotenko, Igor | Gorodetsky, Vladimir | Skormin, Victor A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 GOR] (1).
500. Ontologies-based business integration

by Rebstock, Michael | Fengel, Janina | Paulheim, Heiko.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2008Availability: Items available for loan: [Call number: 658.872 REB] (1).

Powered by Koha