|
761.
|
Peer-to-peer computing : applications, architecture, protocols and challenges
by Kwok, Yu-Kwong Ricky. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 004.652 KWO] (1).
|
|
762.
|
Web-based and traditional outsourcing
by Sharma, Vivek | Sharma, Varun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 658.405802854678 SHA] (1).
|
|
763.
|
Bayesian artificial intelligence
by Korb, Kevin B | Nicholson, Ann E. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 519.542 KOR] (1).
|
|
764.
|
Transmission techniques for emergent multicast and broadcast systems
by Silva, Mario Marques Da | Correia, Americo M. C | Dins, Rui | Souto, Nuno. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 621.382 SIL] (1).
|
|
765.
|
Security and policy priven computing
by Liu, Lei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
766.
|
Designing network on-chip architectures in the nanoscale era
by Bertozzi, Davide | Flich, Jose. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2011Availability: Items available for loan: [Call number: 621.381531 FLI] (1).
|
|
767.
|
Security informatics
by Yang, Christopher C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 YAN] (1).
|
|
768.
|
Dynamics of information systems : theory and applications
by Hirsch, Michael J | Murphey, Robert | Pardalos, Panos M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 003.54 HIR] (1).
|
|
769.
|
Handbook of mobile ad hoc networks for mobility models
by Roy, Radhika Ranjan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 621.3845 ROY] (1).
|
|
770.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
771.
|
Advanced Network Programming : principles and techniques : network application programming with Java
by Ciubotaru, Bogdan | Muntean, Gabriel-Miro. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2013Availability: Items available for loan: [Call number: 004.6 CIU] (1).
|
|
772.
|
Flexible adaptation in cognitive radios
by Li, Shuchun | Kokar, Miecyslaw. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 621.384 LIS] (1).
|
|
773.
|
Economics of information security and privacy III
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
774.
|
Cognitive radio networks : from theory to practice
by Khattab, Ahmed | Bayoumi, Magdy | Perkins, Dmitri. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 621.382 KHA] (1).
|
|
775.
|
Security and privacy in social networks
by Altshuler, Yaniv | Aharony, Nadav | Cremers, Armin B | Elovici, Yuval. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2012Availability: Items available for loan: [Call number: 006.754 ALT] (1).
|
|
776.
|
Managing and mining sensor data
by Aggarwal, Charu C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 006.312 AGG] (1).
|
|
777.
|
Security for cloud storage systems
by Yang, Kan | Jia, Xiaohua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
|
|
778.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
779.
|
Opportunistic Mobile Social Networks
by Wu, Jie. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 006.754 WUJ] (1).
|
|
780.
|
Essential cybersecurity science : build, test, and evaluate secure systems
by Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
|