|
501.
|
Open development : networked innovations in international development
by Smith, Matthew L | Reilly, Katherine M. A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2013Availability: Items available for loan: [Call number: 303.4833091724 SMI] (1).
|
|
502.
|
Trust and risk in Internet commerce
by Camp, L. Jean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
503.
|
City of bits : space, place and the infobahn
by Mitchell, William J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: MIT Press, 2000Availability: Items available for loan: [Call number: 303.4833 MIT] (1).
|
|
504.
|
E-Topia
by Mitchell, William J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: MIT Press, 1999Availability: Items available for loan: [Call number: 303.48 MIT] (1).
|
|
505.
|
Wealth of networks : how social production transforms markets and freedom
by Benkler, Yochai. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Haven: Yale University Press, 2006Availability: Items available for loan: [Call number: 303.4833 BEN] (1).
|
|
506.
|
Mobile IP : present state and future
by Mondal, Abdul Sakib. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New york: Kluwer Academic, 2003Availability: Items available for loan: [Call number: 004.62 MON] (1).
|
|
507.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|
|
508.
|
Art of software security testing : identifying software security flaws
by Wysopal, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
|
|
509.
|
How to break Web software : functional and security testing of Web applications and Web services
by Andrews, Mike | Whittaker, James A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
|
|
510.
|
Craft of system security
by Smith, Sean | Marchesini, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
511.
|
Fuzzing : brute force vulnerabilty discovery
by Sutton, Michael | Amini, Pedram | Greene, Adam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
|
|
512.
|
Computer networking : a top-down approach
by Kurose, James F | Ross, Keith W. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 004.678 KUR] (1).
|
|
513.
|
Chained exploits : advanced hacking attacks from start to finish
by Whitaker, Andrew | Evans, Keatron | Voth, Jack B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
514.
|
Succeeding with SOA : realizing business value through total architecture
by Brown, Paul C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 004.22 BRO] (1).
|
|
515.
|
Essential Facebook development : build successful applications for the Facebook platform.
by Maver, John | Popp, Cappy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 006.754 MAV] (1).
|
|
516.
|
Mathematical Foundations of Computer Networking
by Keshav, Srinivasan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida: Pearson Education, 2013Availability: Items available for loan: [Call number: 004.601519 KES] (1).
|
|
517.
|
Practice of Cloud System Administration : designing and operating large distributed systems, Vol 2.
by Limonceli, Thomas A | Chalup, Strata R | Hogan, Christina J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2015Availability: Items available for loan: [Call number: 004.6782068 LIM] (1).
|
|
518.
|
Cult of the amateur : how blogs, MySpace, YouTube, and the rest of today's user-generated media are destroying our economy, our culture, and our values
by Keen, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Doubleday, 2007Availability: Items available for loan: [Call number: 303.4833 KEE] (1).
|
|
519.
|
Access control systems : security, identity management and trust models
by Benantar, Messaoud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
|
|
520.
|
Grid enabled remote instrumentation
by Davoli, F | Meyer, Norbert | Pugliese, R | Zappatore, S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 004.36 DAV] (1).
|