Your search returned 135 results.

Sort
Results
CCNA 1 and 2 companion guide

by Cisco Networking Academy Program.

Material type: Text Text Publication details: Delhi Pearson Education 2005Availability: Items available for loan: 1 Call number: 621.3981 C37C.

Data networks,IP and the internet protocols, design and operation

by Clark, Martin P.

Material type: Text Text Publication details: England John Wiley 2003Availability: Items available for loan: 2 Call number: 621.3981 C39D, ...

Mission-critical network planning

by Liotine, Matthew.

Material type: Text Text Publication details: Boston Artech House 2003Availability: Items available for loan: 1 Call number: 621.3981 L65M.

Cryptography and network security principles and practice

by Stallings, William.

Material type: Text Text Publication details: New Delhi Pearson Education 2005Availability: Items available for loan: 1 Call number: 621.3853 S67C.

Computer networking

by Rowe, Stanford H | Schuh, Marsha L. jt.au.

Material type: Text Text Publication details: Delhi Pearson Education 2005Availability: Items available for loan: 1 Call number: 621.381952 R93C.

Home networking technologies and standards

by Zahariadis, Theodore B.

Material type: Text Text Publication details: Boston Artech House 2003Availability: Items available for loan: 1 Call number: 621.3821 Z2H.

Computer networks principles,technologies and protocols for network design

by Olifer, Natalia.

Material type: Text Text Publication details: Chichester John Wiley and Sons 2006Availability: Items available for loan: 1 Call number: 621.381952 O35C. Not available: Checked out (1).

Principles and practices of interconnection networks

by Dally, William James | Towles, Brain jt.au.

Material type: Text Text Publication details: New Delhi Elsevier India 2005Availability: Items available for loan: 2 Call number: 621.3981 D12P, ...

C++ network programming

by Schmidt, Douglas C | Huston, Stephen D. jt.au.

Material type: Text Text Publication details: Delhi Pearson Education 2003Availability: Items available for loan: 1 Call number: 621.381952 S21C.

Hacker's handbook the strategy behind breaking into and defending networks

by Yound, Susan.

Material type: Text Text Publication details: Boca Raton Auerbach Publications 2003Availability: Items available for loan: 1 Call number: 005.8 Y7H.

Strategic information security

by Wylder, John.

Material type: Text Text Publication details: Boca Raton Auerbach Publications 2003Availability: Items available for loan: 1 Call number: 005.8 W96S.

Computer intrusion detection and network monitoring a statistical viewpoint

by Marchette, David J.

Material type: Text Text Publication details: New York Springer-Verlag 2001Availability: Items available for loan: 1 Call number: 005.8 M32C.

Managing cyber threats

by Kumar, Vipin Ed.

Material type: Text Text Publication details: New York Springer Science 2005Availability: Items available for loan: 1 Call number: 005.8 K98M.

Advances in security and payment methods for mobile commerce

by Hu, Wen-Chen.

Material type: Text Text Publication details: Hershey IDEA Group Publishing 2005Availability: Items available for loan: 1 Call number: 658.478 H86A.

Protocols for secure electronic commerce

by Sherif, Mostafa Hashem.

Material type: Text Text Publication details: Boca Raton CRC Press 2003Availability: Items available for loan: 1 Call number: 658.872028558 S39P.

Defense and detection strategies against internet worms

by Nazario, Jose.

Material type: Text Text Publication details: Boston Artech House 2004Availability: Items available for loan: 1 Call number: 005.84 N32D.

Sensor network protocols

by Mahgoub, Imad | Ilyas, Mohammad jt.au.

Material type: Text Text Publication details: Boca Raton Taylor and Francis 2006Availability: Items available for loan: 1 Call number: 681.2 M27S.

Know your enemy

Material type: Text Text Publication details: Boston Addison-Wesley 2004Availability: Items available for loan: 1 Call number: 005.8 K86.

Law and the information superhighway

by Perritt, Henry.

Material type: Text Text Publication details: New York Aspen Law and Business 2000Availability: Items available for loan: 2 Call number: 343.7309944 P40L, ...

Hacking exposed network security secrets and solutions

by Mcclure, Stuart | Scambray, Joel jt.au.

Material type: Text Text Publication details: New York McGraw-Hill 2005Availability: Items available for loan: 1 Call number: 005.8 M50H.

Pages

Powered by Koha