Your search returned 287 results.

1.
Artificial Intelligence Techniques for Networked Manufacturing Enterprises Management by Lyes Benyoucef

by Benyoucef, Lyes | Grabot, Bernard.

Material type: Text Text Publication details: London Springer Verlag, Netherlands 2010Availability: Items available for reference: Not for loanCall number: REF 006.319 BEN (1). :

2.
Proceedings of the 2nd National Conference on Computing for Nation Development: (08th-09th February, 2008) : INDIACom--2008 Edited by M. N. Hoda

by Hoda, M. N.

Material type: Text Text Publication details: New Delhi Bharti Vidyapeeth's Institute of Computer Applications and Management 2008Availability: Items available for loan: Call number: 005.1 HOD (1).

3.
Storage Networks Explained: basics and application of fibre channel SAN, NAS, ISCSI and infiniband by Ulf Troppens

by Troppens, Ulf | Muller, Wolfgang | Erkens, Rainer.

Material type: Text Text Publication details: India Wiley India 2008Availability: Items available for loan: Call number: 004.6 TRO (7).

4.
Storage Area Network Essentials: a complete guide to understanding and implementating sans by Richard Barker

by Barker, Richard | Massiglia, Paul.

Material type: Text Text Publication details: India Wiley India 2008Availability: Items available for loan: Call number: 004.6 BAR (7).

5.
CompTIA Network+ certification Study Guide: exam N10-004 2E Robert J. Shimonski

by Shimonski, Robert | Cross, Michael | Alpern, Naomi.

Material type: Text Text Publication details: Burlington Syngress Publishing, Inc 2009Availability: Items available for loan: Call number: CDR 004.6 SHI (1).

6.
Cyber Security: understanding cyber crimes, computer forensics and legal perspectives Nina Godbole

by Godbole, Nina | Belapure, Sunit.

Material type: Text Text Publication details: New Delhi Wiley India 2011Availability: Items available for loan: Call number: CDR 005.8 GOD (7).

7.
Dynamic Ad Hoc Networks Edited by Habib F. Rashvand

by Rashvand, Habib F | Chao, Han-Chieh.

Material type: Text Text Publication details: London Institution of Engineering and Technology 2013Availability: Items available for reference: Not for loanCall number: REF 004.6 RAS (1). :

8.
CEH v9: Certified Ethical Hacker Version 9 Study Guide Sean-Philip Oriyano

by Oriyano, Sean-Philip.

Material type: Text Text Publication details: New Delhi Wiley 2018Availability: No items available : Checked out (1).

9.
Comptia security+ study guide : exam SY0-501 Emmett Dulaney

by Dulaney, Emmett | Easttom, Chuck.

Material type: Text Text Publication details: New Delhi Wiley 2018Availability: Items available for loan: Call number: 005.8 DUL (2).

10.
Next Generation Network Services: technologies and strategies Neill Wilkinson

Material type: Text Text Publication details: New Delhi Wiley 2017Availability: Items available for loan: Call number: 004.6 WIL (2).

11.
Abusing the Internet of things : blackouts, freakouts, and stakeouts Nitesh Dhanjani

by Dhanjani, Nitesh.

Material type: Text Text Publication details: New Delhi O'Reilly 2018Availability: Items available for loan: Call number: 005.8 DHA (2).

12.
Computer Networks Vikrant Vij

by Vij, Vikrant.

Material type: Text Text Publication details: New Delhi USP 2018Availability: Items available for loan: Call number: 004.6 VIJ (1).

13.
Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit Vijay Kumar Velu

by Velu, Vijay Kumar.

Edition: 2nd ed.Material type: Text Text Publication details: Mumbai PACKT 2017Availability: Items available for loan: Call number: 005.8 VEL (1).

14.
Achieving Interoperability in Critical IT and Communication Systems Edited by Robert I. Desourdis

by Desourdis, Robert I | McClure, James R | Sinclair, James E | Jacobson, Christopher P | Rosamilia, Peter J.

Material type: Text Text Publication details: Bostan Artech House 2009Availability: Items available for reference: Not for loanCall number: REF 363.340284 DES (1). :

15.
Ad Hoc Wireless Networks: architectires and Protocols by C. Siva Ram Murthy

by Murthy, C. Siva Ram | B.S. Manoj.

Edition: 2nd ed.Material type: Text Text Publication details: New Delhi Pearson Education Asia 2004Availability: Items available for loan: Call number: 621.384 MUR (2).

16.
Advances in Bayesian Networks Jose A. Gamez

by Gamez, Jose A.

Material type: Text Text Publication details: Berlin Springer Verlag 2004Availability: Items available for reference: Not for loanCall number: REF 006.32 GAM (1). :

17.
Advances in Security and Payment Methods for Mobile Commerce by Wen-Chen Hu

by Hu, Wen-Chen | Kou, Weidong | Lee, Chung-wei.

Material type: Text Text Publication details: London IDEA Group Publishing 2004Availability: Items available for loan: Call number: 658.8 HUW (1).

18.
Analytical Network and System Administration: managing human-computer networks by Mark Burgess

by Burgess, Mark.

Material type: Text Text Publication details: England John Wiley & Sons 2004Availability: Items available for reference: Not for loanCall number: REF 004.6 BUR (1). :

19.
Autonomic Communication Edited by Athanasios V. Vasilakos

by Vasilakos, Athanasios V | Karnouskos, Stamatis | Parashar, Manish.

Material type: Text Text Publication details: New York Springer 2009Availability: Items available for reference: Not for loanCall number: REF 004.6 VAS (1). :

20.
Bioinformatics: methods and protocols Edited by Stephen Misener and Stephen A. Krawetz

by Misener, Stephen | Krawetz, Stephen, A.

Material type: Text Text Publication details: New Jersey Humana Press 2003Availability: Items available for loan: Call number: 572.86 MIS (2). Items available for reference: Not for loanCall number: REF 572.86 MIS (1).


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha