-
1
Internet system handbook
Reading, Mass. : Addison-Wesley, 1993Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
2
Principles of information security
Boston, Mass. ; [London] : Thomson Course Technology, 2003Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
3
Ad hoc wireless networking
Boston : Kluwer Academic Publishers, 2004Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
4
Computer networks : a systems approach
Amsterdam ; Boston : Morgan Kaufmann, 2012
5th ed.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
5
LAN management with SNMP and RMON
New York : Wiley Computer Pub., 1996Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
6
The e-business (r)evolution : living and working in an interconnected world
Upper Saddle River, NJ : Prentice Hall PTR, 2000Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
7
Cyberchase. EcoHaven CSE
Hollywood, Calif. : Paramount : Distributed by Paramount Home Entertainment, 2005Format: DVD
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
8
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
San Francisco : No Starch Press, 2005Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
9
Cyber terrorism : political and economic implications
Hershey, PA : Idea Group Pub., 2006Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
10
Zero configuration networking : the definitive guide
Sebastopol, CA : O'Reilly, 2006Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
11
Distributed computing environments
New York : McGraw-Hill, 1993Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
12
Security data visualization : graphical techniques for network analysis
San Francisco : No Starch Press, 2007Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
13
Digital networking and T-carrier multiplexing
Chichester, England ; New York : Wiley, 1990Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
14
Introduction to computer networks and cybersecurity
Boca Raton : CRC Press/Taylor & Francis Group, 2013Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
15
Delivering voice over frame relay and ATM
New York : Wiley, 1998Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
16
Neural network architectures : an introduction
New York, N.Y. : Van Nostrand Reinhold, 1990Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
17
Development and management of virtual schools : issues and trends
Hershey, PA : Information Science Pub., 2004Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
18
Broadband network analysis and design
Boston : Artech House, 1993Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
19
The amazing Internet challenge : how leading projects use library skills to organize the Web
Chicago : American Library Association, 1999Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
20
Nmap network scanning : official Nmap project guide to network discovery and security scanning
Sunnyvale, CA : Insecure.Com, LLC, 2008Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?>