|
781.
|
Social networking primer for librarians
by Landis, Cliff. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Neal-Schuman Publishers, 2010Availability: Items available for loan: [Call number: 021.7 LAN] (1).
|
|
782.
|
Most complex machine : A survey of computers and computing
by Eck, David J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Wellesley: A K Peters, 1995Availability: Items available for loan: [Call number: 004 ECK] (1).
|
|
783.
|
Introduction to network security
by Krawetz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
|
|
784.
|
Scalable and Secure Internet Services and Architecture
by Xu, Cheng zhong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
|
|
785.
|
Handbook of approximation algorithms and metaheurististics
by Gonzalez, Teofilo F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall/CRC, 2007Availability: Items available for loan: [Call number: 005.1 GON] (1).
|
|
786.
|
Handbook of Parallel computing : models, algorithms and applications
by Reif, John | Rajasekaran, Sanguthevar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 005.1 RAJ] (1).
|
|
787.
|
Fundamentals of natural computing : basic concepts, algorithms, and applications
by De Castro, Leandro Nunes. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2006Availability: Items available for loan: [Call number: 005.1 DEC] (1).
|
|
788.
|
Performance Analysis of Queuing and Computer Networks
by Dattatreya, G. R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2008Availability: Items available for loan: [Call number: 004.6 DAT] (1).
|
|
789.
|
Wireless sensor network security
by Zhou, Jianying | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 681.2 LOP] (1).
|
|
790.
|
Approximation methods for efficient learning of Bayesian networks
by Riggelsen, Carsten. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 519.542 RIG] (1).
|
|
791.
|
Aspects of network and information security
by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
|
|
792.
|
Network security architectures
by Convery, Sean | Cisco Systems, Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
793.
|
Deploying voice over wireless LANs
by Geier, Jim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2007Availability: Items available for loan: [Call number: 621.385 GEI] (1).
|
|
794.
|
Securing the borderless network : security for the web 2.0 world
by Gillis, Tom. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2010Availability: Items available for loan: [Call number: 005.8 GIL] (1).
|
|
795.
|
Practical software factories in .NET
by Lenz, Gunther | Wienands, Christoph. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berkeley: Apress, 2006Availability: Items available for loan: [Call number: 005.276 LEN] (1).
|
|
796.
|
Wikinomics : how mass collaboration changes everything
by Tapscott, Don | Williams, Anthony D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Portfolio, 2007Availability: Items available for loan: [Call number: 658.046 TAP] (1).
|
|
797.
|
Security data visualization : graphical techniques for network analysis
by Conti, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
798.
|
Security for mobile networks and platforms
by Aissi, Selim | Dabbous, Nora | Prasad, Anand R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 AIS] (1).
|
|
799.
|
Delay-and Disruption-Tolerant Networking
by Farrell, Stephen | Cahill, Vinny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 004.6 FAR] (1).
|
|
800.
|
Role-Based Access Control
by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
|