Refine your search
-
Custom search filters
Availability
-
Authors
- Brotby, W. Krag
- Denko, Mieso K.
- Hinson, Gary
- Howard, Patrick D.
- Khoury, Franjieh El
- Longo, Stefano
- Middleton, Bruce
- Mohammed, Mohssen
- Mostashari, Ali
- Sharma, Vivek
- Speed, Tyler Justin
- Tarkoma, Sasu
- Thuraisingham, Bhava...
- Tiller, James S.
- Williams, Walter
- Wu, Hanqing
- Yu, F. Richard
- Zhang, Xi
- Zhang, Yan
- Zheng, Jun
- Show more
- Show less
-
Home libraries
-
Item types
-
Locations
-
Series
-
Topics
- Automatic control
- Business enterprises
- Computer crimes
- Computer networks
- Computer security
- Computer viruses
- Computers
- Contracting out
- Electronic data proc...
- Information technolo...
- Intranets (Computer ...
- Intrusion detection ...
- Peer-to-peer archite...
- Penetration testing ...
- Robust control
- Routing (Computer ne...
- Service-oriented arc...
- Telecommunication
- Wireless communicati...
- Show more
- Show less
-
Titles