Refine your search
Availability
-
Authors
- Basta, Alfred
- Basta, Nadine
- Cerra, Allison
- Chakraborty, Abhishe...
- Donoso, Yezid and Fa...
- Erickson, Jon
- Forouzan, Behrouz A....
- Hosmer, Chet
- Issac, Biju
- Khoury, Franjieh El
- Manoj, B. S.
- Morana, Marco M.
- O'Reilly, James
- Obaidat, Mohammad S.
- Obaidat, Mohammad S....
- Rahul Singh
- Rébé, Nathalie [Ed.]
- Stallings, William
- Uceda Vélez, Tony
- Weber, Richard
- Show more
- Show less
-
Collections
-
Item types
-
Locations
-
Series
-
Topics
- Business enterprises
- Computer networks
- Computer networks--S...
- Computer security
- Computer Security
- Cyberinfrastructure
- Data encryption (Com...
- Data protection
- Database Security
- Electronic surveilla...
- Information Technolo...
- Management informati...
- Packet switching (Da...
- Peer-to-peer archite...
- POLITICAL SCIENCE / ...
- Python (Computer pro...
- Risk assessment
- Telecommunication sy...
- Show more
- Show less