Results
|
|
451.
|
|
Image from Amazon.com
|
Trusted communications with physical layer security for 5G and beyond by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: London Institution of Engineering and Technology 2017
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,48M:(894):5G Q7.
star rating
Average : 0.0 out of 5 stars
|
|
|
452.
|
|
Image from Amazon.com
|
Trustworthy computing: Analytical and quantitative engineering evaluation by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey John Wiley & Sons, Inc, 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TOR.
star rating
Average : 0.0 out of 5 stars
|
|
|
453.
|
|
Image from Amazon.com
|
Understanding and applying cryptography and data security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
454.
|
|
Image from Amazon.com
|
Understanding voice over IP security by Series: Artech House telecommunication library
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boston Artech House 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P6 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
455.
|
|
Image from Amazon.com
|
|
|
|
456.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
457.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
458.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
459.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
460.
|
|
|
Unofficial guide to ethical hacking by Series: Ethical hacking series
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi Macmillan 2006
Availability: Items available for loan: South Campus Library (1)Collection, call number: D6,8(B),94 P6.
star rating
Average : 0.0 out of 5 stars
|
|
|
461.
|
|
Image from Amazon.com
|
|
|
|
462.
|
|
Image from Amazon.com
|
Virtualization Security : protecting virtualized environments by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Indiananapolis John Wiley 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
463.
|
|
Image from Amazon.com
|
VoIP security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Oxford Digital Press 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P5 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
464.
|
|
Image from Amazon.com
|
WiMax security and quality of service:an end-to-end perspective by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Chichester Wiley 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) Q0 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
465.
|
|
Image from Amazon.com
|
Windows forensic analysis DVD tool kit by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Burlington Syngress Publishing Inc. 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91W:(894) P9 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
466.
|
|
Image from Amazon.com
|
|
|
|
467.
|
|
Image from Amazon.com
|
|
|
|
468.
|
|
Image from Amazon.com
|
Wireless mobile internet security by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: West Sessex Wiley 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) Q3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
469.
|
|
Image from Amazon.com
|
Wireless networking principles: From terrestrial to underwater acoustic by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Singapore Springer 2018
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,4 Q8.
star rating
Average : 0.0 out of 5 stars
|
|
|
470.
|
|
Image from Amazon.com
|
|
|
|
471.
|
|
Image from Amazon.com
|
Wireless security by Series: Newnes know it all series
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Amsterdam Elsevier 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P9 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
472.
|
|
Image from Amazon.com
|
Wireless security by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) Q2 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
473.
|
|
Image from Amazon.com
|
Wireless security and cryptography: specifications and implementations by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,4:(894) P7 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
474.
|
|
Image from Amazon.com
|
Wireless security and privacy: best practices and design techniques by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Delhi Pearson Education (Singapore) Pvt. Ltd. 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
475.
|
|
Image from Amazon.com
|
Wireless sensor network security by Series: Cryptology and information security series, 1
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Amsterdam IOS Press 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P8 TD.
star rating
Average : 0.0 out of 5 stars
|