<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'su:{ Network technology}']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Network%20technology%7D&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Network%20technology%7D&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:{ Network technology}' at Delhi University Library System]]> </description> <opensearch:totalResults>86</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Network%20technology%7D&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dsu%253A%257B%2520Network%2520technology%257D" startPage="" /> <item> <title> 5G and Beyond Wireless Networks Technology, Network Deployments, and Materials for Antenna Design </title> <dc:identifier>ISBN:9781003407836</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1733033</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1003407838.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Indrasen Singh; Shubham Tayal; Niraj Pratap Singh; Vijay Shanker Tripathi; Ghanshyam Singh.<br /> Taylor and Francis 2024 9781003407836 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1733033">Place hold on <em>5G and Beyond Wireless Networks</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1733033</guid> </item> <item> <title> A novel approach to social network analysis using soft co,puting techniques Poonam Rani </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=886527</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Poonam Rani Au..<br /> 2020 .<br /> 189p. | p. cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=886527">Place hold on <em>A novel approach to social network analysis using soft co,puting techniques Poonam Rani</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=886527</guid> </item> <item> <title> Access, fronthaul and backhaul networks for 5G and beyond </title> <dc:identifier>ISBN:9781785612138 (HBK)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=2030</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1785612131.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Imran Muhammad Ali.<br /> London Institution of Engineering and Technology 2017 .<br /> xxii,558p. ill. , Index 541-558p. cm.<br /> 9781785612138 (HBK) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=2030">Place hold on <em>Access, fronthaul and backhaul networks for 5G and beyond</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=2030</guid> </item> <item> <title> Actor-Network Theory and Crime Studies Explorations in Science and Technology </title> <dc:identifier>ISBN:9781315565576</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1751014</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1315565579.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Dominique Robert; Martin Dufresne.<br /> Taylor and Francis 2015 9781315565576 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1751014">Place hold on <em>Actor-Network Theory and Crime Studies</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1751014</guid> </item> <item> <title> Advanced intorduction to digital society </title> <dc:identifier>ISBN:9781803921136</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1308300</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1803921137.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Castells, Manuel.<br /> Cheltenham Edward Elgar Publishing 2024 .<br /> x, 152p. 9781803921136 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1308300">Place hold on <em>Advanced intorduction to digital society</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1308300</guid> </item> <item> <title> Advanced wireless networks: Technology and business models </title> <dc:identifier>ISBN:9781119096856 (hbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=4864</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119096855.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Glisic Savo.<br /> West Sussex John Wiley 2016 .<br /> xiv, 832p. ill. , Index 827-832p. cm.<br /> 9781119096856 (hbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=4864">Place hold on <em>Advanced wireless networks: Technology and business models</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=4864</guid> </item> <item> <title> AI and Blockchain Technology in 6G Wireless Network </title> <dc:identifier>ISBN:9789811928680</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1665172</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9811928681.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Malaya Dutta Borah, Pushpa Singh, Ganesh Chandra Deka.<br /> Springer 2022 9789811928680 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1665172">Place hold on <em>AI and Blockchain Technology in 6G Wireless Network</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1665172</guid> </item> <item> <title> Cloud networking: understanding cloud-based data center networks </title> <dc:identifier>ISBN:9780128007280 (pbk) | SL01562703</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16614</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0128007281.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Lee Gary.<br /> Waltham MK 2014 .<br /> xvii, 221p. ill. , Index 211-221p. 9780128007280 (pbk) | SL01562703 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16614">Place hold on <em>Cloud networking: understanding cloud-based data center networks</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16614</guid> </item> <item> <title> Coherent routing techniques for social opportunistic network </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1467943</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Nigam Ritu Au..<br /> Delhi University of Delhi. Faculty of Technology. Department of Computer Engineering 2021 .<br /> 162p. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1467943">Place hold on <em>Coherent routing techniques for social opportunistic network</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1467943</guid> </item> <item> <title> Composite Materials Technology Neural Network Applications </title> <dc:identifier>ISBN:9780429147227</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1771522</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0429147228.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Iqbal Mohammed Mujtaba; S.M. Sapuan.<br /> Taylor and Francis 2009 9780429147227 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1771522">Place hold on <em>Composite Materials Technology</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1771522</guid> </item> <item> <title> Computer and Network Technology - Proceedings of the International Conference on Iccnt 2009 </title> <dc:identifier>ISBN:9789814289771</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1544233</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9814289779.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Mahadevan Venkatesh Et Al.<br /> World Scientific | WSPC 2009 9789814289771 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1544233">Place hold on <em>Computer and Network Technology - Proceedings of the International Conference on Iccnt 2009</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1544233</guid> </item> <item> <title> Considerations on Novel Network Edge Physical Node Architectures: Leveraging Unprecedented (Bottom-up) Technology-centric Approaches Empowered by Micro/Nanotechnologies (MEMS/NEMS) and Federated Learning, with an Outlook on AI/5G-empowered Applications </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1722286</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> IEEE </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1722286">Place hold on <em>Considerations on Novel Network Edge Physical Node Architectures: Leveraging Unprecedented (Bottom-up) Technology-centric Approaches Empowered by Micro/Nanotechnologies (MEMS/NEMS) and Federated Learning, with an Outlook on AI/5G-empowered Applications</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1722286</guid> </item> <item> <title> CRC Handbook of Local Area Network Software Concepts and Technology </title> <dc:identifier>ISBN:9781351071116</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1821826</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1351071114.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Paul L. Fortier.<br /> Taylor and Francis 1991 9781351071116 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1821826">Place hold on <em>CRC Handbook of Local Area Network Software</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1821826</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559186</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11534</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson Education 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559186 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11534">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11534</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559185</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11533</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson Education 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559185 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11533">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11533</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559184</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11532</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson Education 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559184 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11532">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11532</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559183</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11531</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson Education 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559183 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11531">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11531</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559182</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11530</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson Education 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559182 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11530">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11530</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559371</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11310</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559371 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11310">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11310</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559370</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11309</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559370 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11309">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11309</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559369</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11308</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559369 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11308">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11308</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559368 Cost realised</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11307</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559368 Cost realised </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11307">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11307</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559367</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11306</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559367 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11306">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11306</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559366</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11305</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559366 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11305">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11305</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559365</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11304</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559365 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11304">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11304</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559364</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11303</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559364 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11303">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11303</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559363</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11302</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559363 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11302">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11302</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01559362</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11301</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices 675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01559362 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11301">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11301</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558911</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11274</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558911 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11274">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11274</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558910</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11273</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558910 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11273">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11273</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558909</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11272</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558909 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11272">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11272</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558908</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11271</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558908 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11271">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11271</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558907</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11270</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558907 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11270">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11270</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558906</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11269</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558906 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11269">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11269</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558905</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11268</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558905 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11268">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11268</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558904</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11267</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558904 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11267">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11267</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558903</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11266</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558903 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11266">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11266</guid> </item> <item> <title> Cryptography and network security: Principles and practice </title> <dc:identifier>ISBN:9788131761663 (pbk) | SL01558902</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11265</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings William.<br /> New Delhi Pearson 2011 .<br /> 743p. , Appendices675-722p.; References 723-734p.; Index 735-743p. 9788131761663 (pbk) | SL01558902 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11265">Place hold on <em>Cryptography and network security: Principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11265</guid> </item> <item> <title> Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices </title> <dc:identifier>ISBN:9780429318726</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1742393</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0429318723.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Alex Alexandrou.<br /> Taylor and Francis 2021 9780429318726 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1742393">Place hold on <em>Cybercrime and Information Technology</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1742393</guid> </item> <item> <title> Design and analysis of sensor network architecture with new features </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=881272</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Virmani Deepali.<br /> 2012 .<br /> 197p. | p. cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=881272">Place hold on <em>Design and analysis of sensor network architecture with new features</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=881272</guid> </item> <item> <title> Digital Media Sport Technology, Power and Culture in the Network Society </title> <dc:identifier>ISBN:9780203382851</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1759209</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0203382854.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Brett Hutchins; David Rowe.<br /> Taylor and Francis 2013 9780203382851 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1759209">Place hold on <em>Digital Media Sport</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1759209</guid> </item> <item> <title> e-Business essentials technology and network requirements for mobile and online markets </title> <dc:identifier>ISBN:0471521833 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=123651</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0471521833.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Norris Mark.<br /> Chichester John Wiley and Sons 2001 .<br /> xvi, 336p. cm..<br /> 0471521833 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=123651">Place hold on <em>e-Business essentials </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=123651</guid> </item> <item> <title> Efficient resource utilization techniques for cloud in adhoc network </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=887423</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Malhotra Amarjit Au..<br /> 2020 .<br /> 141p. | p. cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=887423">Place hold on <em>Efficient resource utilization techniques for cloud in adhoc network</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=887423</guid> </item> <item> <title> Fundamentals of Sensor Network Programming: Applications and Technology </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1718520</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Iyengar.<br /> IEEE 2011 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1718520">Place hold on <em>Fundamentals of Sensor Network Programming: Applications and Technology</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1718520</guid> </item> <item> <title> Geography of Technology Transfer in China: a Glocal Network Approach </title> <dc:identifier>ISBN:9789811274961</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1539317</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9811274967.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Liu Chengliang.<br /> World Scientific | WSPC 2023 9789811274961 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1539317">Place hold on <em>Geography of Technology Transfer in China: a Glocal Network Approach</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1539317</guid> </item> <item> <title> Global Digital Technology Convergence Driving Diffusion via Network Effects </title> <dc:identifier>ISBN:9781003401490</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1733384</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/100340149X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ewa Lechman; Adam Marszk.<br /> Taylor and Francis 2024 9781003401490 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1733384">Place hold on <em>Global Digital Technology Convergence</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1733384</guid> </item> <item> <title> High-Performance Backbone Network Technology </title> <dc:identifier>ISBN:9781315214672</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1788617</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1315214679.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Brian J. Thompson; Naoaki Yamanaka.<br /> Taylor and Francis 2004 9781315214672 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1788617">Place hold on <em>High-Performance Backbone Network Technology</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1788617</guid> </item> <item> <title> Informatin technology applications in academic libraries in India with emphasis on network service and information sharing </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=928344</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Moorthy AL Ed..<br /> Ahmedabad Information and Library Network Centre 1997 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=928344">Place hold on <em>Informatin technology applications in academic libraries in India with emphasis on network service and information sharing</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=928344</guid> </item> <item> <title> Information technology : principles, practices, opportunities </title> <dc:identifier>ISBN:0131436260 (hbk) | SL00859583</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=13344</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0131436260.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Senn James A.<br /> New Jersey Person 2004 .<br /> xxv,648p. ill. , Concise dictionary of IT terminology 617-632p.; Credits c.1-3p.; Subject index I.1-13p. 0131436260 (hbk) | SL00859583 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=13344">Place hold on <em>Information technology : principles, practices, opportunities</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=13344</guid> </item> <item> <title> Information technology and the computer network </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=61747</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Beauchamp K G Ed..<br /> Berlin Springer-verlag 1984 .<br /> viii,271p. cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=61747">Place hold on <em>Information technology and the computer network</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=61747</guid> </item> </channel> </rss>
