Refine your search
Availability
- Showing only available items
- Show all items
-
Authors
- Bell, Genevieve
- Comaniciu, Cristina
- Forouzan, Behrouz A.
- Galloway, Anne
- Hjorth, Larissa
- Horst, Heather A.
- Kaufman, Charlie
- Kim, Peter
- Mandayam, Narayan B.
- Marchesini, John
- Messier, Ric
- Mukhopadhyay, Debdee...
- Perlman, Radia
- Poor, H. Vincent
- Smith, Sean
- Speciner, Michael
- Stallings, William
- Show more
- Show less
-
Collections
-
Holding libraries
- IIITD [x]
-
Item types
-
Locations
-
Series
-
Topics
- Anthropology
- Automated exploits
- Computer crimes--Pre...
- Computer networks [x]
- Computer networks--S...
- Computer programming
- Computer security
- Computer software--T...
- Cross-layer designs ...
- Cryptography
- Data transmission sy...
- Demodulation (Electr...
- Electronic data proc...
- Ethnology
- Hackers
- Kali Linux
- Penetration testing ...
- System design
- Show more
- Show less