Refine your search
Availability
-
Authors
- Anwar, Waqar
- Basta, Alfred
- Basta, Nadine
- Cerra, Allison
- Chapman, Chris
- Edwards, Jason
- Erickson, Jon
- Essar, Mohammad Ilya...
- Forouzan, Behrouz A.
- Hosmer, Chet
- Israr, Nauman
- Issac, Biju
- Jin, Jennifer
- Kahate, Atul
- Khoury, Franjieh El
- Morana, Marco M.
- Rébé, Nathalie [Ed.]
- Stallings, William
- Uceda Vélez, Tony
- Weaver, Griffin
- Show more
- Show less
-
Collections
-
Item types
-
Locations
-
Series
-
Topics
- Business enterprises
- Computer networks
- Computer networks--S...
- Computer security
- Computer Security
- COMPUTERS
- Corporate culture
- Cyberinfrastructure
- Data encryption (Com...
- Data protection
- Database Security
- Hackers
- Management informati...
- Peer-to-peer archite...
- POLITICAL SCIENCE / ...
- Python (Computer pro...
- Risk assessment
- Risk management
- Telecommunication sy...
- Show more
- Show less