Refine your search
-
Custom search filters
Availability
-
Authors
- Brotby, W. Krag
- Hinson, Gary
- Hnatyshin, Vasil Y.
- Howard, Patrick D.
- Khoury, Franjieh El
- Middleton, Bruce
- Mohammed, Mohssen
- Mostashari, Ali
- Sharma, Vivek
- Speed, Tyler Justin
- Spyropoulos, Thrasyv...
- Tarkoma, Sasu
- Thuraisingham, Bhava...
- Tiller, James S.
- Vasilakos, Athanasio...
- Williams, Walter
- Wu, Hanqing
- Yu, F. Richard
- Zhang, Xi
- Zhang, Yan
- Show more
- Show less
-
Home libraries
-
Item types
-
Locations
-
Series
-
Topics
- Business enterprises
- Computer algorithms
- Computer crimes
- Computer networks
- Computer security
- Computer viruses
- Computers
- Contracting out
- Electronic data proc...
- Electronic data proc...
- Extranets (Computer ...
- Information networks
- Information technolo...
- Intranets (Computer ...
- Intrusion detection ...
- Peer-to-peer archite...
- Penetration testing ...
- Routing (Computer ne...
- Telecommunication
- Show more
- Show less
-
Titles