|
521.
|
Advances in queueing theory and network applications
by Wuyi, Yue | Takagi, Hideaki | Takahashi,Yutaka. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 519.82 WUY] (1).
|
|
522.
|
Global initiatives to secure cyberspace : an emerging landscape
by Portnoy, Michael | Goodman, Seymour E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
|
|
523.
|
Reliable distributed systems : technologies, web services, and applications
by Birman, Kenneth P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004.6 BIR] (1).
|
|
524.
|
Wireless networks : multiuser detection in cross-layer design
by Mandayam, Narayan B | Comaniciu, Cristina | Poor, H. Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.3821 COM] (1).
|
|
525.
|
Optical networking standards : a comprehensive guide
by Kazi, Khurram. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.3827 KAZ] (1).
|
|
526.
|
Managing cyber threats : issues, approaches, and challenges
by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
|
|
527.
|
Scalable hardware verification with symbolic simulation
by Bertacco, Valeria. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.392 BER] (1).
|
|
528.
|
Peer-to-peer computing for mobile networks : information discovery and dissemination
by Papadopouli, Maria | Schulzrinne, Henning. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 621.382 PAP] (1).
|
|
529.
|
Wireless network security
by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
|
|
530.
|
Computer viruses and malware
by Aycock, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
|
|
531.
|
Ultra-low power wireless technologies for sensor networks
by Otis, Brian | Rabaey, Jan M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 OTI] (1).
|
|
532.
|
Malware detection
by Mihai, Christodorescu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
|
|
533.
|
Secure localization and time synchronization for wireless sensor and ad hoc networks
by Poovendran, Radha. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 681.2 POO] (1).
|
|
534.
|
Privacy-respecting intrusion detection
by Flegel, Ulrich. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
|
|
535.
|
Networks and Grids : technology and theory
by Robertazzi, Thomas G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 004.6 ROB] (1).
|
|
536.
|
Wireless ad hoc and sensor networks : a cross-layer design perspective
by Jurdak, Raja. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 JUR] (1).
|
|
537.
|
Practical Internet security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
538.
|
Handbook of database security : applications and trends
by Jajodia, Sushil | Gertz, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
539.
|
Cryptanalytic attacks on RSA
by Yan, Song Y. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
540.
|
Wireless sensor networks and applications
by Li, Yingshu | Thai, My T | Wu, Weili. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 681.2 LIY] (1).
|