581. IPTV deployment challenges and opportunities

by Srivastava, Anurag | Acharya, Swarup.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2006Availability: Items available for loan: [Call number: 621.38807 SRI] (1).
582. IPv6 deployment issues

by Hain, Tony.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: IEEE Communications Society, 2004Availability: Items available for loan: [Call number: 004.62 HAI] (1).
583. How to be a bawse

by Singh, Lilly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: United Kingdom: Penguin, 2017Availability: Items available for loan: [Call number: 650.13 SIN] (1).
584. Symmetric cryptographic protocols

by Ramkumar, Mahalingam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2014Availability: Items available for loan: [Call number: 005.82 RAM] (1).
585. Creating value with social media analytics: managing, aligning, and mining social media text, networks, actions, location, apps, hyperlinks, multimedia, & search engines data

by Khan, Gohar F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: USA: CreateSpace, Seattle, WA, 2018Availability: Items available for loan: [Call number: 302.231 KHA] (1).
586. Mobile search behaviors : an in-depth analysis based on contexts, apps, and devices

by Wu, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: Morgan & Claypool Publishers, 2018Availability: Items available for loan: [Call number: 025.0425 WUD] (1).
587. Bridging UX and web development: better results through team integration

by Moffett, Jack.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2014Availability: Items available for loan: [Call number: 006.70684 MOF] (1).
588. Advanced design and implementation of virtual machines

by Li, Xiao-Feng.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London CRC press 2016Availability: Items available for loan: [Call number: 005.3 LIX] (1).
589. Google It : total information awareness

by Lee, Newton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 025.04252 LEE] (1).
590. DNS security management

by Dooley, Michael | Rooney, Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
591. SCION : a secure internet architecture

by Perrig, Adrian | Szalachowski, Pawel | Reischuk, Raphael M | Chuat, Laurent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2017Availability: Items available for loan: [Call number: 004.678 PER] (1).
592. Protocols for Secure Electronic Commerce

by Sherif, Mostafa Hashem.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2016Availability: Items available for loan: [Call number: 658.8 SHE] (1).
593. Internet of things (IoT) systems : architectures, algorithms, methodologies

by Serpanos, Dimitrios | Wolf, Marilyn.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2018Availability: Items available for loan: [Call number: 004.67 SER] (1).
594. Huawei and snowden questions

by Lysne, Olav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
595. A guide to kernel exploitation : attacking the core

by Perla, Enrico | Massimiliano, Oldani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
596. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
597. Anomaly detection principles and algorithms

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
598. DNS security : defending the Domain Name System

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
599. How to attack and defend your website

by Dalziel, Henry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
600. Data science for cyber-security

by Heard, Nick | Rubin-Delanchy, Patrick | Adams,Niall | Turcotte, Melissa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey : World Scientific, 2018Availability: Items available for loan: [Call number: 005.8 HEA] (1).

Powered by Koha