|
581.
|
IPTV deployment challenges and opportunities
by Srivastava, Anurag | Acharya, Swarup. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2006Availability: Items available for loan: [Call number: 621.38807 SRI] (1).
|
|
582.
|
IPv6 deployment issues
by Hain, Tony. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: IEEE Communications Society, 2004Availability: Items available for loan: [Call number: 004.62 HAI] (1).
|
|
583.
|
How to be a bawse
by Singh, Lilly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: United Kingdom: Penguin, 2017Availability: Items available for loan: [Call number: 650.13 SIN] (1).
|
|
584.
|
Symmetric cryptographic protocols
by Ramkumar, Mahalingam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2014Availability: Items available for loan: [Call number: 005.82 RAM] (1).
|
|
585.
|
Creating value with social media analytics: managing, aligning, and mining social media text, networks, actions, location, apps, hyperlinks, multimedia, & search engines data
by Khan, Gohar F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: USA: CreateSpace, Seattle, WA, 2018Availability: Items available for loan: [Call number: 302.231 KHA] (1).
|
|
586.
|
Mobile search behaviors : an in-depth analysis based on contexts, apps, and devices
by Wu, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: Morgan & Claypool Publishers, 2018Availability: Items available for loan: [Call number: 025.0425 WUD] (1).
|
|
587.
|
Bridging UX and web development: better results through team integration
by Moffett, Jack. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2014Availability: Items available for loan: [Call number: 006.70684 MOF] (1).
|
|
588.
|
Advanced design and implementation of virtual machines
by Li, Xiao-Feng. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London CRC press 2016Availability: Items available for loan: [Call number: 005.3 LIX] (1).
|
|
589.
|
Google It : total information awareness
by Lee, Newton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 025.04252 LEE] (1).
|
|
590.
|
DNS security management
by Dooley, Michael | Rooney, Timothy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
|
|
591.
|
SCION : a secure internet architecture
by Perrig, Adrian | Szalachowski, Pawel | Reischuk, Raphael M | Chuat, Laurent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2017Availability: Items available for loan: [Call number: 004.678 PER] (1).
|
|
592.
|
Protocols for Secure Electronic Commerce
by Sherif, Mostafa Hashem. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
|
|
593.
|
Internet of things (IoT) systems : architectures, algorithms, methodologies
by Serpanos, Dimitrios | Wolf, Marilyn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 004.67 SER] (1).
|
|
594.
|
Huawei and snowden questions
by Lysne, Olav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
|
|
595.
|
A guide to kernel exploitation : attacking the core
by Perla, Enrico | Massimiliano, Oldani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
596.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
597.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 006.312 MEH] (1).
|
|
598.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
599.
|
How to attack and defend your website
by Dalziel, Henry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
|
|
600.
|
Data science for cyber-security
by Heard, Nick | Rubin-Delanchy, Patrick | Adams,Niall | Turcotte, Melissa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey : World Scientific, 2018Availability: Items available for loan: [Call number: 005.8 HEA] (1).
|