1. Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations

by Datta, Anupam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.8 DAT] (1).
2. TCP/IP protocol suite

by Forouzan, Behrouz A.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill Education, 2006Availability: Items available for loan: [Call number: 004.62 FOR] (1).
3. Transmission lines and lumped circuits

by Maffucci, Antonio | Miano, Giovanni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego: Academic Press, 2001Availability: Items available for loan: [Call number: 621.319 MIA] (1).
4. Routing, flow, and capacity design in communication and computer networks

by Pioro, Michal | Medhi, Deepankar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2004Availability: Items available for loan: [Call number: 004.66 PIO] (1).
5. ASN.1 communication between heterogeneous systems

by Dubuisson, Olivier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 004.35 DUB] (1).
6. Java 2 network security

by Pistoia, Marco.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
7. Essential guide to computing

by Walters, E. Garrison.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 004 WAL] (1).
8. Network Management : concepts and practice, a hands-on approach

by Burke, J. Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 004.6068 BUR] (2).
9. Data communications and computer networks

by Duck, Michael | Read, Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 DUC] (1).
10. Networking

by Beasley, Jeffrey S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Ohio: Prentice Hall, 2004Availability: Items available for loan: [Call number: 004.6 BEA] (2).
11. Network distributed computing : fitscapes and fallacies

by Goff, Max K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 GOF] (1).
Tags:
12. Malware : fighting malicious code

by Skoudis, Ed | Zeltser, Lenny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
13. Optimizing Network Performance with Content Switching : server, firewall and cache load balancing.

by Syme, Matthew | Goldie, Philip.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 004.6 SYM] (1).
14. Introduction to operating systems and networks

by Watson, Ruth A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Pearson Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.4469 WAT] (1).
15. On demand computing : technologies and strategies

by Fellenstein, Craig.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: IBM Press, 2003Availability: Items available for loan: [Call number: 004 FEL] (1).
16. Internet denial of service : attack and defense mechanisms

by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
17. Building N1 grid solutions : preparing, architecting, and implementing service-centric data centers

by Carolan, Jason | Radeztsky, Scott | Strong, Paul | Turner, Ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: Sun Microsystems Press, 2004Availability: Items available for loan: [Call number: 004.0684 CAR] (1).
18. Firewalls and VPNs : principles and practices

by Tibbs, Richard | Oakes, Edward.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
19. Discrete neural computation : a theoretical foundation

by Kailath, Thomas | Roychowdhury, Vwani | Siu, Kai-Yeung.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 1995Availability: Items available for loan: [Call number: 006.3 SIU] (1).
20. Circuits of the mind

by Valiant, Leslie G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford: Oxford University Press, 1994Availability: Items available for loan: [Call number: 612.82 VAL] (1).

Powered by Koha