Limit Search Results
Author
Language
Subject
6786 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
2. 
Cover image for Computer Network Security
8. 
Cover image for Corporate computer and network security
12. 
Cover image for Tutorial : computer and network security
22. 
Cover image for Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings.
27. 
Cover image for Computer, network, software, and hardware engineering with applications
32. 
Cover image for Proceedings of the 3rd European conference on computer network defense
41. 
Cover image for Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings
45. 
Cover image for Network control and engineering for QoS, security and mobility, V :  IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
46. 
Cover image for Computer networks : principles, technologies, and protocols for network design
47. 
Cover image for Computer network time synchronization : the network time protocol
52. 
Cover image for Analytical network and system administration : managing human-computer systems
54. 
Cover image for Computer intrusion detection and network monitoring : a statistical viewpoint
72. 
Cover image for Quantitative system performance : computer system analysis using queueing network models
83. 
Cover image for Trust and security in collaborative computing
85. 
Cover image for Interlinking of computer networks
91. 
Cover image for Internetworking with TCP/IP
93. 
95. 
Cover image for Developing IP multicast networks
96. 
98. 
102. 
Cover image for Computer Security Fundamentals
105. 
Cover image for Machine Learning for Future Wireless Communications
109. 
Cover image for Toward Deep Neural Networks : WASD Neuronet Models, Algorithms, and Applications
110. 
Cover image for Smart Data : State-of-the-Art Perspectives in Computing and Applications
111. 
Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
112. 
Cover image for Security in IoT-Enabled Space
113. 
Cover image for Artificial intelligence for autonomous networks
124. 
Cover image for Deep Learning for Search
127. 
Cover image for Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practices
128. 
Cover image for CRYPTOLOGY : Classical and Modern
129. 
Cover image for Software Defined-WAN for the Digital Age : A Bold Transition to Next Generation Networking
145. 
Cover image for CompTIA security+ guide to network security fundamentals
146. 
Cover image for Network Routing : Algorithms, Protocols, and Architectures
154. 
Cover image for Information literacy : progress, trends and challenges
158. 
Cover image for CYBERSECURITY ESSENTIALS
159. 
Cover image for Recent Advances in Artificial Neural Networks
162. 
Cover image for The Illustrated network : How TCP/IP Works in a Modern Network
163. 
Cover image for Software Defined Networks : A Comprehensive Approach
164. 
Cover image for Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
165. 
Cover image for Advanced Penetration Testing : Hacking the World's Most Secure Networks
174. 
Cover image for Applied Neural Networks and Soft Computing
175. 
Cover image for PATTERN RECOGNITION AND BIG DATA
177. 
Cover image for Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technology
189. 
Cover image for Big Data over Networks
197. 
Cover image for Introduction to information systems
198. 
Cover image for Opportunistic mobile social networks
199. 
Cover image for Exploring neural networks with C#
200. 
Cover image for Getting to know web GIS
228. 
Cover image for Big data : a business and legal guide
229. 
Cover image for Software and systems architecture in action
231. 
Cover image for Theory, concepts and methods of recurrent neural networks and soft computing
232. 
Cover image for Applications of cryptography and network security
234. 
Cover image for Software defined networking : design and deployment
235. 
Cover image for The essentials of computer organization and architecture
236. 
Cover image for Bayesian networks : with examples in R
237. 
Cover image for Industrial network security :  securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
250. 
Cover image for Brain computation as hierarchical abstraction
252. 
Cover image for Performance evaluation by simulation and analysis with applications to computer networks
273. 
Cover image for Event-based neuromorphic systems
274. 
Cover image for Introduction to modern cryptography
275. 
Cover image for Web security : a WhiteHat perspective
277. 
Cover image for Handbook of computer networks and communications
278. 
Cover image for Computer forensics : cybercriminals, laws, and evidence
279. 
Cover image for Computational network science : an algorithmic approach
298. 
Cover image for Analysis of Computer Networks
299. 
Cover image for Wireless ad hoc and sensor networks : management, performance, and applications