Limit Search Results
Author
Language
Format
Subject
3566 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
2. 
Cover image for Computer Network Security
11. 
Cover image for Computer-assisted network and system analysis
13. 
Cover image for Information technology and the computer network
15. 
Cover image for Network analysis : theory and computer methods
18. 
Cover image for Introduction to computer and network security : navigating shades of gray
19. 
Cover image for The practical OPNET user guide for computer network simulation
20. 
Cover image for Computer, network, software, and hardware engineering with applications
21. 
Cover image for Computer network time synchronization : the Network Time Protocol on Earth and in space
25. 
Cover image for Minoli-Cordovana's authoritative computer & network security dictionary
26. 
Cover image for Network control and engineering for QoS, security and mobility, V :  IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
27. 
Cover image for Computer networks : principles, technologies, and protocols for network design
28. 
Cover image for Computer network time synchronization : the network time protocol
29. 
Cover image for Risk management for computer security : Protecting your network and information assets
30. 
Cover image for Analytical network and system administration : managing human-computer systems
32. 
Cover image for An engineering approach to computer networking : ATM networks, the internet, and the telephone network
34. 
Cover image for Quantitative system performance : computer system analysis using queueing network models
38. 
Cover image for Trust and security in collaborative computing
39. 
Cover image for Man-computer interaction research MACINTER-I
40. 
Cover image for Interlinking of computer networks
43. 
Cover image for Internetworking with TCP/IP
44. 
Cover image for Developing IP multicast networks
46. 
Cover image for Computer Security Fundamentals
47. 
Cover image for Machine Learning for Future Wireless Communications
48. 
Cover image for Enabling Technologies and Architectures for Next-Generation Networking Capabilities
49. 
Cover image for Toward Deep Neural Networks : WASD Neuronet Models, Algorithms, and Applications
50. 
Cover image for Smart Data : State-of-the-Art Perspectives in Computing and Applications
51. 
Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
52. 
Cover image for Security in IoT-Enabled Space
53. 
Cover image for Artificial intelligence for autonomous networks
54. 
Cover image for AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam
55. 
Cover image for Deep Learning for Search
56. 
Cover image for Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practices
57. 
Cover image for CRYPTOLOGY : Classical and Modern
58. 
Cover image for Software Defined-WAN for the Digital Age : A Bold Transition to Next Generation Networking
59. 
Cover image for Kinematic Control of Redundant Robot Arms Using Neural Networks
60. 
Cover image for CompTIA security+ guide to network security fundamentals
61. 
Cover image for Network Routing : Algorithms, Protocols, and Architectures
62. 
Cover image for Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications
63. 
Cover image for Information literacy : progress, trends and challenges
64. 
Cover image for Fundamentals of Network Planning and optimisation 2G/3G/4G : Evolution to 5G
65. 
Cover image for CYBERSECURITY ESSENTIALS
66. 
Cover image for Recent Advances in Artificial Neural Networks
67. 
Cover image for The Illustrated network : How TCP/IP Works in a Modern Network
68. 
Cover image for Software Defined Networks : A Comprehensive Approach
69. 
Cover image for Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
70. 
Cover image for Advanced Penetration Testing : Hacking the World's Most Secure Networks
72. 
Cover image for Network Forensics
73. 
Cover image for Applied Neural Networks and Soft Computing
74. 
Cover image for PATTERN RECOGNITION AND BIG DATA
75. 
Cover image for Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technology
76. 
Cover image for Cyber-physical system design with sensor networking technologies
77. 
Cover image for NETWORKING BIG DATA
78. 
Cover image for Big Data over Networks
79. 
Cover image for CYBER-RISK INFORMATICS : Engineering Evaluation with Data Science
80. 
Cover image for Introduction to information systems
81. 
Cover image for Opportunistic mobile social networks
82. 
Cover image for Exploring neural networks with C#
83. 
Cover image for Getting to know web GIS
84. 
Cover image for Big data : a business and legal guide
85. 
Cover image for Software and systems architecture in action
86. 
Cover image for E-learning : technology, training and teaching
87. 
Cover image for Theory, concepts and methods of recurrent neural networks and soft computing
88. 
Cover image for Applications of cryptography and network security
90. 
Cover image for Software defined networking : design and deployment
91. 
Cover image for The essentials of computer organization and architecture
92. 
Cover image for Bayesian networks : with examples in R
93. 
Cover image for Industrial network security :  securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
95. 
Cover image for Performance evaluation by simulation and analysis with applications to computer networks
98. 
Cover image for Protocols and procedures of cryptography and network security
99. 
Cover image for Event-based neuromorphic systems
100. 
Cover image for Introduction to modern cryptography
101. 
Cover image for Web security : a WhiteHat perspective
102. 
Cover image for Case studies in secure computing : achievements and trends
103. 
Cover image for Handbook of computer networks and communications
104. 
Cover image for Computer forensics : cybercriminals, laws, and evidence
105. 
Cover image for Computational network science : an algorithmic approach
106. 
Cover image for Security policies and implementation issues
110. 
Cover image for Analysis of Computer Networks
111. 
Cover image for Wireless ad hoc and sensor networks : management, performance, and applications
112. 
Cover image for Networking A Beginner's Guide
113. 
Cover image for Cybersecurity : managing systems, conducting testing, and investigating intrusions
114. 
Cover image for Guide to network defense and countermeasures
115. 
Cover image for Security management of next generation telecommunications networks and services
116. 
Cover image for Verification of communication protocols in web services : model-checking service compositions
118. 
Cover image for Advanced routing protocols for wireless networks
119. 
Cover image for Mobility protocols and handover optimization : design, evaluation and application
120. 
Cover image for NGN architectures, protocols, and services
121. 
Cover image for Network convergence : ethernet applications and next generation packet transport architectures
122. 
Cover image for CCNA routing and switching review guide : exams 100-101, 200-101, and 200-120
123. 
Cover image for Introduction to information security : a strategic-based approach
124. 
Cover image for Teaching and learning online. Volume 2, New models of learning for a connected world
125. 
Cover image for Managing information security
126. 
Cover image for Business continuity and disaster recovery planning for IT professionals
127. 
Cover image for The basics of IT audit : purposes, processes, and practical information
128. 
Cover image for Social media security : leveraging social networking while mitigating risk
129. 
Cover image for Identity and access management : business performanve through connected intelligence
130. 
Cover image for Cyber security and IT infrastructure protection
131. 
Cover image for Network and system security
132. 
Cover image for Hacking with Kali : practical penetration testing techniques
133. 
Cover image for Network security firewalls, and VPNs
134. 
Cover image for Hacker techniques, tools, and incident handling
135. 
Cover image for Neuro-fuzzy equalizers for mobile cellular channels
136. 
Cover image for Self-healing systems and wireless networks management
137. 
Cover image for Conducting network penetration and espionage in a global environment
138. 
Cover image for Fieldbus and networking in process automation
141. 
Cover image for Enterprise integration and information architecture: a systems perspective on industrial information integration
142. 
Cover image for Business communication : developing leaders for a networked world
143. 
Cover image for Cryptography and network security : principles and practice
144. 
Cover image for Data and computer communications
145. 
Cover image for Network security essentials applications and standards
146. 
Cover image for Security without obscurity : a guide to confidentiality, authentication, and integrity
147. 
Cover image for Future Information Technology : FutureTech 2014
148. 
Cover image for ZigBee® network protocols and applications
149. 
Cover image for Mobile networks and cloud computing convergence for progressive services and applications
150. 
Cover image for E-learning 2.0 technologies and web applications in higher education
151. 
Cover image for The social classroom : integrating social network use in education
152. 
Cover image for Academic knowledge construction and multimodal curriculum development
154. 
Cover image for Applied network security monitoring : collection, detection, and analysis
155. 
Cover image for Neural networks and statistical learning
156. 
Cover image for Green networking and communications : ICT for sustainability
158. 
Cover image for Peer-to-peer leadership : why the network is the leader
159. 
Cover image for Transform : how leading companies are winning with disruptive social media
160. 
Cover image for Security for multihop wireless networks
161. 
Cover image for Network innovation through OpenFlow and SDN : principles and design
162. 
Cover image for Improving the performance of wireless LANs : a practical guide
163. 
Cover image for Semantic multimedia analysis and processing
164. 
Cover image for Design of modern communication network : methods and applications
165. 
Cover image for Co-operative and energy efficient body area and wireless sensor networks for healthcare applications
166. 
Cover image for He texted! : the no-abbreves, WTF truth about men and dating in the digital era
167. 
Cover image for Security for service oriented architectures
169. 
Cover image for Unified communications forensics : anatomy of common UC attacks
170. 
Cover image for DESIGNING ENTERPRISE ARCHITECTURE FRAMEWORKS : Integrating Business Processes with IT Infrastructure
171. 
Cover image for Future computer and information technology
172. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
173. 
Cover image for The war on learning : gaining ground in the digital university
174. 
Cover image for The Digital Youth Network : cultivating digital media citizenship in urban communities
176. 
Cover image for Communication networks for smart grids : making smart grid real
177. 
Cover image for Intelligent computing, networking, and informatics : proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013
178. 
Cover image for Advances in secure computing, internet services, and applications
179. 
Cover image for Architectures and protocols for secure information technology infrastructures
180. 
Cover image for Network security technologies : design and applications
182. 
Cover image for Security, privacy, trust, and resource management in mobile and wireless communications
183. 
Cover image for Broadband access : wireline and wireless--alternatives for Internet services
184. 
Cover image for Cabling Part 1 : LAN/Data center networks and cabling systems
185. 
Cover image for Computer security and penetration testing
186. 
Cover image for What every engineer should know about cyber security and digital forensics
187. 
Cover image for The Intrusion detection networks : a key to collaborative security
188. 
Cover image for Responsive security  : be ready to be secure
189. 
Cover image for The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
191. 
Cover image for CompTIA security+ review guide : exam sy0-401
192. 
Cover image for Software defined networks : a comprehensive approach
193. 
Cover image for Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
194. 
Cover image for Targeted cyber attacks : multi-staged attacks driven by exploits and malware
195. 
Cover image for Modeling enterprise architecture with TOGAF : a practical guide using UML and BPMN
196. 
Cover image for Eat, cook, grow : mixing human-computer interactions with human-food interactions
197. 
Cover image for Reality mining : using big data to engineer a better world
199. 
Cover image for Building next-generation converged networks : theory and practice
200. 
Cover image for Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
201. 
Cover image for Telehealth networks for hospital services : new methodologies
202. 
Cover image for Handbook of research on ICTs for human-centered healthcare and social care services
203. 
Cover image for UTM security with Fortinet : Mastering FortiOS
204. 
Cover image for Security patterns in practice : designing secure architectures using software patterns
205. 
Cover image for Risk propagation assessment for network security : application to airport communication network design
206. 
Cover image for Information security
207. 
Cover image for Optimal and robust scheduling for networked control systems
208. 
Cover image for Network attacks and defenses : a hands-on approach
209. 
Cover image for Network and information security : issues, challenges and research trends
210. 
Cover image for Intelligent systems for security informatics
212. 
Cover image for Network security : a beginner's guide
213. 
Cover image for Mobile ad hoc networking : the cutting edge directions
214. 
Cover image for Information security for managers
215. 
Cover image for Key enablers for user-centric advertising across next generation networks
216. 
Cover image for Metro Ethernet services for LTE backhaul
218. 
Cover image for Deploying IPv6 in 3GPP networks : evolving mobile broadband from 2G to LTE and beyond
219. 
Cover image for Homeplug AV and IEEE 1901 : a handbook for PLC designers and users
220. 
Cover image for User-centered agile method
221. 
Cover image for Virtual networks : pluralistic approach for the next generation of internet
222. 
Cover image for IPv6 deployment and management
223. 
Cover image for Dynamic ad hoc networks
224. 
Cover image for Security risks in social media technologies : safe practices in public service applications
225. 
Cover image for Teaching on the education frontier : instructional strategies for online and blended classrooms, grades 5-12
226. 
Cover image for Microsoft sharepoint 2013 inside out
227. 
Cover image for MCSD certification toolkit (exam 70-483) : programming in c#
229. 
Cover image for Introduction to computer networks and cybersecurity
230. 
Cover image for Future mobile communications : LTE optimization and mobile network virtualization
231. 
Cover image for Internet of things, smart spaces, and next generation networking : 13th international conference, NEW2AN 2013 and 6th Conference, ruSMART 2013, St. Petersburg, Russia, August 28-30, 2013 : proceedings
232. 
Cover image for Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings
234. 
Cover image for Modeling, analysis and optimization of network-on-chip communication architectures
236. 
Cover image for Distributed sensor networks : image and sensor signal processing
237. 
Cover image for Advanced transport protocols : designing the next generation
238. 
Cover image for Strategic management of information systems
239. 
Cover image for SharePoint 2013 branding and user interface design
240. 
Cover image for Hacking for dummies
241. 
Cover image for Intelligent networks : recent approaches and applications in medical systems
242. 
Cover image for Future information communication technology and applications : ICFICE 2013
243. 
Cover image for Performance modeling and design of computer systems : queueing theory in action
244. 
Cover image for Developing digital literacies : a framework for professional learning
245. 
Cover image for Social networking for language education
246. 
Cover image for The basics of web hacking : tools and techniques to attack the Web
247. 
Cover image for Cyber warfare : techniques, tactics and tools for security practitioners
248. 
Cover image for Eleventh hour CISSP : study guide
249. 
Cover image for Cyber crime, security and digital intelligence
250. 
Cover image for BACnet:  the global standard for building automation and control networks
251. 
Cover image for Designing SCADA application software : a practical approach
252. 
Cover image for LTE-advanced air interface technology
253. 
Cover image for PeopleSoft PeopleTools data management and upgrade handbook
255. 
Cover image for Collaborative enterprise architecture : enriching EA with lean, agile, and enterprise 2.0 practices
256. 
Cover image for Scalable computing and communications : theory and practice
257. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
258. 
Cover image for Cyberspace and cybersecurity
259. 
Cover image for Network anomaly detection : a machine learning perspective
260. 
Cover image for Introduction to networking with network+
261. 
Cover image for Business data communications : infrastructure, networking and security
262. 
Cover image for Corporate computer security.
263. 
Cover image for Web application defender's cookbook : battling hackers and protecting users
264. 
Cover image for Hands-on networking fundamentals
266. 
Cover image for Linear programming and algorithms for communication networks : a practical guide to network design, control, and management
267. 
Cover image for Distributed networks : intelligence, security, and applications
268. 
Cover image for Wireless networking : understanding internetworking challenges.
269. 
Cover image for Internet protocol-based emergency services
270. 
Cover image for Complex-valued neural networks : advances and applications
271. 
Cover image for Databases and information systems VII : selected papers from the tenth International Baltic Conference, DB&IS 2012
272. 
Cover image for Scalability, density, and decision making in cognitive wireless networks
273. 
Cover image for The handbook of personal area networking technologies and protocols
274. 
Cover image for Performance modeling, stochastic networks, and statistical multiplexing
275. 
Cover image for Microsoft sharepoint 2013 developer reference
276. 
Cover image for The practice of network security monitoring : understanding incident detection and response
278. 
Cover image for Web social science : concepts, data and tools for social scientists in the digital age
279. 
Cover image for Iris biometric model for secured network access
280. 
Cover image for Ad hoc mobile wireless networks : principles, protocols, and applications
281. 
Cover image for FISMA and the risk management framework : the new practice of federal cyber security
282. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
283. 
Cover image for Troubleshooting and repairing commercial electrical equipment
284. 
Cover image for Research and advanced technology for digital libraries : International Conference on Theory and Practice of Digital Libraries, TPDL 2013, Valletta, Malta, September 22-26, 2013. Proceedings
285. 
Cover image for Advances in communication networking : 19th EUNICE/IFIP 6.2, 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings
286. 
Cover image for Web-based multimedia advancements in data communications and networking technologies
287. 
Cover image for Pragmatic security metrics : applying metametrics to information security
288. 
Cover image for Memory allocation problems in embedded systems : optimization methods
289. 
Cover image for Networking basics
290. 
Cover image for Cognitive radio technology applications for wireless and mobile ad hoc networks
291. 
Cover image for The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
292. 
Cover image for Game theory in communication networks : cooperative resolution of interactive networking scenarios
293. 
Cover image for Green communications and networking
294. 
Cover image for Mobile ad hoc robots and wireless robotic systems : design and implelmentation
295. 
Cover image for Roadside networks for vehicular communications : architectures, applications, and test fields
296. 
Cover image for Computer and information security handbook
297. 
Cover image for Digital literacies : research and resources in language teaching
298. 
Cover image for Linked data : A Geographic Perspective
299. 
Cover image for Dynamic systems biology modeling and simulation
300. 
Cover image for Computer networking : a top-down approach