521. Advances in queueing theory and network applications

by Wuyi, Yue | Takagi, Hideaki | Takahashi,Yutaka.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 519.82 WUY] (1).
522. Global initiatives to secure cyberspace : an emerging landscape

by Portnoy, Michael | Goodman, Seymour E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
523. Reliable distributed systems : technologies, web services, and applications

by Birman, Kenneth P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004.6 BIR] (1).
524. Wireless networks : multiuser detection in cross-layer design

by Mandayam, Narayan B | Comaniciu, Cristina | Poor, H. Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.3821 COM] (1).
525. Optical networking standards : a comprehensive guide

by Kazi, Khurram.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.3827 KAZ] (1).
526. Managing cyber threats : issues, approaches, and challenges

by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
527. Scalable hardware verification with symbolic simulation

by Bertacco, Valeria.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.392 BER] (1).
528. Peer-to-peer computing for mobile networks : information discovery and dissemination

by Papadopouli, Maria | Schulzrinne, Henning.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 621.382 PAP] (1).
529. Wireless network security

by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
530. Computer viruses and malware

by Aycock, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
531. Ultra-low power wireless technologies for sensor networks

by Otis, Brian | Rabaey, Jan M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 OTI] (1).
532. Malware detection

by Mihai, Christodorescu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
533. Secure localization and time synchronization for wireless sensor and ad hoc networks

by Poovendran, Radha.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 681.2 POO] (1).
534. Privacy-respecting intrusion detection

by Flegel, Ulrich.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
535. Networks and Grids : technology and theory

by Robertazzi, Thomas G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 004.6 ROB] (1).
536. Wireless ad hoc and sensor networks : a cross-layer design perspective

by Jurdak, Raja.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 JUR] (1).
537. Practical Internet security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
538. Handbook of database security : applications and trends

by Jajodia, Sushil | Gertz, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
539. Cryptanalytic attacks on RSA

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
540. Wireless sensor networks and applications

by Li, Yingshu | Thai, My T | Wu, Weili.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 681.2 LIY] (1).

Powered by Koha