781. Social networking primer for librarians

by Landis, Cliff.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Neal-Schuman Publishers, 2010Availability: Items available for loan: [Call number: 021.7 LAN] (1).
782. Most complex machine : A survey of computers and computing

by Eck, David J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Wellesley: A K Peters, 1995Availability: Items available for loan: [Call number: 004 ECK] (1).
783. Introduction to network security

by Krawetz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
784. Scalable and Secure Internet Services and Architecture

by Xu, Cheng zhong.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
785. Handbook of approximation algorithms and metaheurististics

by Gonzalez, Teofilo F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall/CRC, 2007Availability: Items available for loan: [Call number: 005.1 GON] (1).
786. Handbook of Parallel computing : models, algorithms and applications

by Reif, John | Rajasekaran, Sanguthevar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 005.1 RAJ] (1).
787. Fundamentals of natural computing : basic concepts, algorithms, and applications

by De Castro, Leandro Nunes.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2006Availability: Items available for loan: [Call number: 005.1 DEC] (1).
788. Performance Analysis of Queuing and Computer Networks

by Dattatreya, G. R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 004.6 DAT] (1).
789. Wireless sensor network security

by Zhou, Jianying | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 681.2 LOP] (1).
790. Approximation methods for efficient learning of Bayesian networks

by Riggelsen, Carsten.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 519.542 RIG] (1).
791. Aspects of network and information security

by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
792. Network security architectures

by Convery, Sean | Cisco Systems, Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
793. Deploying voice over wireless LANs

by Geier, Jim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2007Availability: Items available for loan: [Call number: 621.385 GEI] (1).
794. Securing the borderless network : security for the web 2.0 world

by Gillis, Tom.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Cisco Press, 2010Availability: Items available for loan: [Call number: 005.8 GIL] (1).
795. Practical software factories in .NET

by Lenz, Gunther | Wienands, Christoph.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Apress, 2006Availability: Items available for loan: [Call number: 005.276 LEN] (1).
796. Wikinomics : how mass collaboration changes everything

by Tapscott, Don | Williams, Anthony D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Portfolio, 2007Availability: Items available for loan: [Call number: 658.046 TAP] (1).
797. Security data visualization : graphical techniques for network analysis

by Conti, Greg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
798. Security for mobile networks and platforms

by Aissi, Selim | Dabbous, Nora | Prasad, Anand R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 AIS] (1).
799. Delay-and Disruption-Tolerant Networking

by Farrell, Stephen | Cahill, Vinny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 004.6 FAR] (1).
800. Role-Based Access Control

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).

Powered by Koha