761. Peer-to-peer computing : applications, architecture, protocols and challenges

by Kwok, Yu-Kwong Ricky.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 004.652 KWO] (1).
762. Web-based and traditional outsourcing

by Sharma, Vivek | Sharma, Varun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 658.405802854678 SHA] (1).
763. Bayesian artificial intelligence

by Korb, Kevin B | Nicholson, Ann E.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 519.542 KOR] (1).
764. Transmission techniques for emergent multicast and broadcast systems

by Silva, Mario Marques Da | Correia, Americo M. C | Dins, Rui | Souto, Nuno.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 621.382 SIL] (1).
765. Security and policy priven computing

by Liu, Lei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
766. Designing network on-chip architectures in the nanoscale era

by Bertozzi, Davide | Flich, Jose.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2011Availability: Items available for loan: [Call number: 621.381531 FLI] (1).
767. Security informatics

by Yang, Christopher C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 YAN] (1).
768. Dynamics of information systems : theory and applications

by Hirsch, Michael J | Murphey, Robert | Pardalos, Panos M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 003.54 HIR] (1).
769. Handbook of mobile ad hoc networks for mobility models

by Roy, Radhika Ranjan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 621.3845 ROY] (1).
770. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
771. Advanced Network Programming : principles and techniques : network application programming with Java

by Ciubotaru, Bogdan | Muntean, Gabriel-Miro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2013Availability: Items available for loan: [Call number: 004.6 CIU] (1).
772. Flexible adaptation in cognitive radios

by Li, Shuchun | Kokar, Miecyslaw.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 621.384 LIS] (1).
773. Economics of information security and privacy III

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 SCH] (1).
774. Cognitive radio networks : from theory to practice

by Khattab, Ahmed | Bayoumi, Magdy | Perkins, Dmitri.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 621.382 KHA] (1).
775. Security and privacy in social networks

by Altshuler, Yaniv | Aharony, Nadav | Cremers, Armin B | Elovici, Yuval.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2012Availability: Items available for loan: [Call number: 006.754 ALT] (1).
776. Managing and mining sensor data

by Aggarwal, Charu C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 006.312 AGG] (1).
777. Security for cloud storage systems

by Yang, Kan | Jia, Xiaohua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2013Availability: Items available for loan: [Call number: 005.8 YAN] (1).
778. Intrusion detection networks : a key to collaborative security

by Fung, Carol | Boutaba, Raouf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
779. Opportunistic Mobile Social Networks

by Wu, Jie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 006.754 WUJ] (1).
780. Essential cybersecurity science : build, test, and evaluate secure systems

by Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).

Powered by Koha