FEEDBACK Smiley face

Your search returned 14 results. Subscribe to this search

|
1. Handbook of information security : key concepts, infrastructure, standards, and protocols, vol I

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

2. Handbook of information security : information warfare; social, legal, and international issues; and security foundations, vol II

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

3. Handbook of information security : threats, vulnerabilities, prevention, detection, and management, vol III

by Bidgoli, Hossein.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken : Wiley, ©2006Online access: Table of contents | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 BID-H] (1).

4. A networking approach to grid computing

by Minoli, Daniel.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, 2005Online access: Book review (E-STREAMS) | Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: IIITD [004.36 MIN-N] (1).

5. Broadband packet switching technologies : a practical guide to ATM switches and IP routers

by Chao, H. Jonathan | Lam, Cheuk H | Oki, Eiji.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Wiley, ©2001Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: IIITD [621.382 CHA-B] (1).

6. Handbook of wireless networks and mobile computing

by Stojmenovic, Ivan.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi: Wiley, 2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: IIITD [621.382 STO-H] (1).

7. Elements of network protocol design

by Gouda, Mohamed G.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : John Wiley & Sons, 1998Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: IIITD [004.62 GAU-E] (1).

8. Mobile ad hoc networking

by Basagni, Stefano.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Wiley, c2004Online access: Table of contents only | Book review (E-STREAMS) | Contributor biographical information | Publisher description Availability: Items available for loan: IIITD [004.68 BAS-M] (1).

9. Nanotechnology applications to telecommunications and networking

by Minoli, Daniel 1952-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi. : Wiley, c2006Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: IIITD [621.382 MIN-N] (1).

10. Energy efficient distributed computing systems

by Zomaya, Albert Y | Lee, Young-Choon 1973-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, ©2012Availability: Items available for loan: IIITD [REF 004.36 ZOM-E] (1).

11. Security patterns in practice : designing secure architectures using software patterns

by Fernandez, Eduardo B.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: West Sussex : Wiley, ©2013Availability: Items available for loan: IIITD [REF 005.8 FER-S] (1).

12. Implementing SSL/TLS using cryptography and PKI

by Davies, Joshua.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, ©2011Other title: Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure.Availability: Items available for loan: IIITD [REF 005.8 DAV-I] (1).

13. Cyber-assurance for the internet of things

by Brooks, Tyson T. (ed.).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Jersey : Wiley, ©2017Availability:
Items available for reference: IIITD [REF 004.678 BRO-C] (1).

14. The Internet of things : connecting objects to the web

by Chaouchi, Hakima (ed.).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Wiley, ©2010Online access: Publisher description | Table of contents only Availability: No items available
Checked out (1).


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in