Limit Search Results
Author
Language
Subject
6786 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
2. 
Cover image for Computer Network Security
11. 
Cover image for Computer-assisted network and system analysis
22. 
Cover image for Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings.
26. 
Cover image for The practical OPNET user guide for computer network simulation
27. 
Cover image for Computer, network, software, and hardware engineering with applications
32. 
Cover image for Proceedings of the 3rd European conference on computer network defense
41. 
Cover image for Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings
45. 
Cover image for Network control and engineering for QoS, security and mobility, V :  IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
46. 
Cover image for Computer networks : principles, technologies, and protocols for network design
47. 
Cover image for Computer network time synchronization : the network time protocol
54. 
Cover image for Computer intrusion detection and network monitoring : a statistical viewpoint
61. 
Cover image for An engineering approach to computer networking : ATM networks, the internet, and the telephone network
72. 
Cover image for Quantitative system performance : computer system analysis using queueing network models
83. 
Cover image for Trust and security in collaborative computing
84. 
Cover image for Man-computer interaction research MACINTER-I
85. 
Cover image for Interlinking of computer networks
91. 
Cover image for Internetworking with TCP/IP
93. 
95. 
Cover image for Developing IP multicast networks
96. 
98. 
102. 
Cover image for Computer Security Fundamentals
105. 
Cover image for Machine Learning for Future Wireless Communications
110. 
Cover image for Smart Data : State-of-the-Art Perspectives in Computing and Applications
111. 
Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
112. 
Cover image for Security in IoT-Enabled Space
113. 
Cover image for Artificial intelligence for autonomous networks
124. 
Cover image for Deep Learning for Search
127. 
Cover image for Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practices
129. 
Cover image for Software Defined-WAN for the Digital Age : A Bold Transition to Next Generation Networking
137. 
Cover image for Kinematic Control of Redundant Robot Arms Using Neural Networks
145. 
Cover image for CompTIA security+ guide to network security fundamentals
146. 
Cover image for Network Routing : Algorithms, Protocols, and Architectures
147. 
Cover image for Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications
157. 
Cover image for Fundamentals of Network Planning and optimisation 2G/3G/4G : Evolution to 5G
158. 
Cover image for CYBERSECURITY ESSENTIALS
162. 
Cover image for The Illustrated network : How TCP/IP Works in a Modern Network
164. 
Cover image for Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
174. 
Cover image for Applied Neural Networks and Soft Computing
175. 
Cover image for PATTERN RECOGNITION AND BIG DATA
177. 
Cover image for Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technology
179. 
Cover image for NETWORKING BIG DATA
189. 
Cover image for Big Data over Networks
198. 
Cover image for Opportunistic mobile social networks
199. 
Cover image for Exploring neural networks with C#
200. 
Cover image for Getting to know web GIS
228. 
Cover image for Big data : a business and legal guide
229. 
Cover image for Software and systems architecture in action
231. 
Cover image for Theory, concepts and methods of recurrent neural networks and soft computing
232. 
Cover image for Applications of cryptography and network security
235. 
Cover image for The essentials of computer organization and architecture
236. 
Cover image for Bayesian networks : with examples in R
237. 
Cover image for Industrial network security :  securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
250. 
Cover image for Brain computation as hierarchical abstraction
252. 
Cover image for Performance evaluation by simulation and analysis with applications to computer networks
274. 
Cover image for Introduction to modern cryptography
275. 
Cover image for Web security : a WhiteHat perspective
276. 
Cover image for Case studies in secure computing : achievements and trends
277. 
Cover image for Handbook of computer networks and communications
279. 
Cover image for Computational network science : an algorithmic approach
280. 
Cover image for Security policies and implementation issues
298. 
Cover image for Analysis of Computer Networks
300. 
Cover image for Networking A Beginner's Guide