1. Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations

by Datta, Anupam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.8 DAT] (1).
2. TCP/IP protocol suite

by Forouzan, Behrouz A.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill Education, 2006Availability: Items available for loan: [Call number: 004.62 FOR] (1).
3. Routing, flow, and capacity design in communication and computer networks

by Pioro, Michal | Medhi, Deepankar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2004Availability: Items available for loan: [Call number: 004.66 PIO] (1).
4. ASN.1 communication between heterogeneous systems

by Dubuisson, Olivier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 004.35 DUB] (1).
5. Java 2 network security

by Pistoia, Marco.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
6. Essential guide to computing

by Walters, E. Garrison.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 004 WAL] (1).
7. Network Management : concepts and practice, a hands-on approach

by Burke, J. Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 004.6068 BUR] (2).
8. Data communications and computer networks

by Duck, Michael | Read, Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 DUC] (1).
9. Networking

by Beasley, Jeffrey S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Ohio: Prentice Hall, 2004Availability: Items available for loan: [Call number: 004.6 BEA] (2).
10. Network distributed computing : fitscapes and fallacies

by Goff, Max K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 GOF] (1).
Tags:
11. Malware : fighting malicious code

by Skoudis, Ed | Zeltser, Lenny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
12. Optimizing Network Performance with Content Switching : server, firewall and cache load balancing.

by Syme, Matthew | Goldie, Philip.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 SYM] (1).
13. Introduction to operating systems and networks

by Watson, Ruth A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Pearson Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.4469 WAT] (1).
14. On demand computing : technologies and strategies

by Fellenstein, Craig.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: IBM Press, 2003Availability: Items available for loan: [Call number: 004 FEL] (1).
15. Internet denial of service : attack and defense mechanisms

by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
16. Building N1 grid solutions : preparing, architecting, and implementing service-centric data centers

by Carolan, Jason | Radeztsky, Scott | Strong, Paul | Turner, Ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: Sun Microsystems Press, 2004Availability: Items available for loan: [Call number: 004.0684 CAR] (1).
17. Firewalls and VPNs : principles and practices

by Tibbs, Richard | Oakes, Edward.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
18. Protecting critical infrastructures against cyber-attack

by Goodman, Seymour E | Longhurst,David W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
19. Parliament in the age of the Internet

by Coleman, Stephen | Donk, Wim Van De | Taylor, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford: Oxford University Press, 1999Availability: Items available for loan: [Call number: 328 COL] (1).
20. Networks of innovation : change and meaning in the age of the Internet

by Tuomi, Ilkka.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2002Availability: Items available for loan: [Call number: 303.483 TUO] (1).

Powered by Koha