1. Security in fixed and wireless networks : an introduction to securing data communications

by Schafer, Gunter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
2. Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security

by Chandra, Praphul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Newnes, 2005Availability: Items available for loan: [Call number: 005.8 CHA] (1).
3. Wireless communications security

by Imai, Hideki | Kobara, Kazukuni | Rahman, Mohammad Ghulam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 IMA] (1).
4. Security in wireless LANs and MANs

by Hardjono, Thomas | Dondeti, Lakshminath R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
5. 802.11 security

by Potter, Bruce | Fleck, Bob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 POT] (1).
6. Hacking exposed wireless : wireless security secrets & solutions

by Cache, Johnny | Liu, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAC] (1).
7. Data communications and network security

by Carr, Houston H | Snyder, Charles A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAR] (1).
8. Wireless networks : multiuser detection in cross-layer design

by Mandayam, Narayan B | Comaniciu, Cristina | Poor, H. Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.3821 COM] (1).
9. Wireless network security

by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
10. Secure localization and time synchronization for wireless sensor and ad hoc networks

by Poovendran, Radha.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 681.2 POO] (1).
11. Wireless Communications : 2007 CNIT Thyrrenian Symposium

by Puppolin, Silvano.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 621.38438 PUP] (1).
12. Securing emerging wireless systems : lower-layer approaches

by Chen, Yingying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 621.384 CHE] (1).
13. Guide to wireless network security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAC] (1).
14. Blackjacking : security threats to Blackberrys, PDAs, and cell phones in the enterprise

by Hoffman, Daniel V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2007Availability: Items available for loan: [Call number: 005.8 HOF] (1).
15. UMTS security

by Niemi, Valtteri | Nyberg, Kaisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 NIE] (2).
16. Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing

by Buttyan, Levente | Hubaux, Jean-Pierre.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
17. Security of mobile communications

by Boudriga, Noureddine.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2010Availability: Items available for loan: [Call number: 621.384 BOU] (1).
18. Resource, mobility, and security management in wireless networks and mobile communications

by Zhang, Yan | Fujise, Masayuki | Hu, Honglin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2006Availability: Items available for loan: [Call number: 621.384 ZHA] (1).
19. Security in wireless mesh networks

by Zhang, Yan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 ZHA] (1).
20. Wireless security and cryptography : specifications and implementations

by Zhang, Xinmiao | Sklavos, Nicolas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2007Availability: Items available for loan: [Call number: 005.8 SKL] (1).

Powered by Koha