|
801.
|
SSL and TLS : theory and practice
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
802.
|
How to own a shadow : the chase for Knuth
by Long, Johnny | Mullen, Timothy M | Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
|
|
803.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
804.
|
Network and system security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
805.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
806.
|
Cyber warfare : techniques, tactics and tools for security practitioners
by Andress, Jason | Winterfeld, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
|
|
807.
|
Network Simulation
by Fujimoto, Richard M | Perumalla, Kalyan S | Riley, George F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Rafael: Morgan & Claypool Publishers, 2007Availability: Items available for loan: [Call number: 004.65 FUJ] (1).
|
|
808.
|
Network coding applications
by Fragouli, Christina | Soljanin, Emina. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hanover: Now Publishers, 2007Availability: Items available for loan: [Call number: 003.5449 FRA] (1).
|
|
809.
|
Semantic knowledge management : an ontology-based framework
by Zilli, Antonio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2009Availability: Items available for loan: [Call number: 658.4038 ZIL] (1).
|
|
810.
|
Social networking communities and e-dating services : concepts and implications
by Romm-livermore, Celia | Setzekorn, Kristina. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2009Availability: Items available for loan: [Call number: 306.7302854678 ROM] (1).
|
|
811.
|
Intelligent techniques for warehousing and mining sensor network data
by Cuzzocrea, Alfredo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2010Availability: Items available for loan: [Call number: 681.2 CUZ] (1).
|
|
812.
|
Localization algorithms and strategies for wireless sensor networks
by Mao, Guoqiang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2009Availability: Items available for loan: [Call number: 621.3821 MAO] (1).
|
|
813.
|
Web services security development and architecture : theoretical and practical issues
by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
|
|
814.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
815.
|
Server side GPS and assisted-GPS in Java
by Harper, Neil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2010Availability: Items available for loan: [Call number: 910 HAR] (2).
|
|
816.
|
Nanoscale communication networks
by Bush, Stephen F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2010Availability: Items available for loan: [Call number: 621.38 BUS] (1).
|
|
817.
|
Cryptography for security and privacy in cloud computing
by Rass, Stefan | Slamanig, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2014Availability: Items available for loan: [Call number: 005.8 RAS] (1).
|
|
818.
|
Emerging technologies for knowledge resource management
by Pandian, M. Paul | Karisiddappa, C. R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Chandos, 2007Availability: Items available for loan: [Call number: 020.285 PAN] (1).
|
|
819.
|
Forensic computing
by Sammes, A. J | Jenkinson, Brian. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 363.250285416 SAM] (1).
|
|
820.
|
Embedded Java security : security for mobile devices
by Debbabi, Mourad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Springer, 2007Availability: Items available for loan: [Call number: 005.8 DEB] (1).
|