Your search returned 154 results.

Sort
Results
Computer networking a top-down approach by
  • Kurose, James F
  • Ross, Keith W
Edition: 6th ed.
Publication details: Noida Pearson 2017
Availability: Items available for loan: University Library (1)Call number: 004.72 KUR.
Cryptography and network security principles and practice William Stallings. by
  • Stallings, William
Edition: 7th ed
Publication details: Chennai Pearson 2019
Availability: Items available for loan: University Library (1)Call number: 004.056.523 STA "2017".
Technology in action complete by
  • Evans, Alan
  • Poatsy, Mary Anne
  • Martin, Kendall
Edition: 14th ed.
Publication details: India Pearson 2019
Availability: Items available for loan: University Library (2)Call number: 004 EVA, ...
Smart cities development and governance frameworks by
  • Mahmood, Zaigham., Ed. by
Publication details: Switzerland Springer 2018
Availability: Items available for loan: University Library (1)Call number: 711.43 SMA.
Network science Albert-László Barabási ; with Márton Pósfai, data analysis and simulations. by
  • Barabasi, Albert-Laszlo
  • Posfai, Marton
Publication details: UK Cambridge university press 2016
Availability: Items available for loan: University Library (1)Call number: 004.72 BAR.
Cyber security engineering a practical approach for systems and software assurance by
  • Mead, Nancy R
  • Woody, Carol C
Publication details: Chennai Pearson 2017
Availability: Items available for loan: University Library (1)Call number: 004.056.53 MEA.
Networking all-in-one by
  • Lowe Doug
Edition: 7th ed.
Publication details: New Delhi Wiley 2018
Availability: Items available for loan: University Library (1)Call number: 004.738.5.057.4 LOW/N.
Hacking by
  • Beaver Kevin
Edition: 6th ed.
Publication details: New Delhi dummies 2018
Availability: Items available for loan: University Library (1)Call number: 004.056.53 BEA/H.
Windows Security Monitoring scenarios and patterns by
  • Miroshnikov,Andrei
Publication details: New Delhi Wiley
Availability: Items available for loan: University Library (1)Call number: 004.451.9 MIR/W.
Cloud adoption playbook proven strategies for transforming your organization with the cloud by
  • Abdula, Moe
  • Averdunk, Ingo
  • Barcia, Roland
  • Emuchay, Ndu
Publication details: New Delhi John Wiley & Sons 2018
Availability: Items available for loan: University Library (1)Call number: 658.114:004 ABD/C.
Cyber guerilla by
  • Haaster Jelle Van
  • Gevers, Rickey
  • Sprengers, Martijn
Publication details: US Syngress 2016
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 HAA/C.
Trusted computing principles and applications by
  • Feng Dengguo...[et.all]
Publication details: Germany De Gruyter 2018
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 FEN/T.
Staying safe online in simple steps by
  • Ballew, Joli
Publication details: Pearson Education Limited 2012
Availability: Items available for loan: University Library (1).
Staying safe online in simple steps by
  • Ballew, Joli
Publication details: Pearson Education Limited 2012
Availability: No items available.
Multiplex and multilevel networks by
  • Battiston,Stefano;ed.by
  • Caldarelli,Guido;ed.by
  • Garas,Antonios;ed.by
Publication details: U K Oxford University press 2019
Availability: Items available for loan: University Library (1)Call number: 004.735 MUL.
Introduction to digital signal processing using matlab with application to digital communications by
  • Thyagarajan, K. S
Publication details: Switzerland Springer 2019
Availability: Items available for loan: University Library (1)Call number: 621.391.8 THY.
Computer and cyber security principles, algorithm, applications, and perspectives by
  • Gupta, Brij B; ed. by
  • Agrawal, Dharma P; ed. by
  • Wang, Haoxiang; ed. by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.7.056.53 COM.
Machine learning for computer and cyber security principles, algorithms, and practices by
  • Gupta Brij, B ed.by
  • Sheng, Michael ed.by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 MAC.
Fourier analysis a signal processing approach by
  • Sundararajan, D
Publication details: Singapore Springer 2018
Availability: Items available for loan: University Library (1)Call number: 517.512:621.391 SUN/F.
5G Wireless systems simulation and evaluation techniques by
  • Yang, Yang...[et.all]
Publication details: Switzerland Springer 2018
Availability: Items available for loan: University Library (1)Call number: 621.39:004.77 YAN/W.
Pages
University Library, CUSAT