Call Number (LC) | Title | Results |
---|---|---|
TK5102.85 .S33 2007 | Secure localization and time synchronization for wireless sensor and ad hoc networks / | 1 |
TK5102.85 .S33 2007 | Secure localization and time synchronization for wireless sensor and ad hoc networks / | 1 |
TK5102.85 .S43 2004 | Security for mobility / | 1 |
TK5102.85 .S43 2009eb | Securing emerging wireless systems lower-layer approaches / | 1 |
TK5102.85 .S43 2011 | Security and privacy in communication networks 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised selected papers / | 1 |
TK5102.85 .S43 2012 | Security and privacy in communication networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised selected papers / | 1 |
TK5102.85 .S43 2015eb | Security and privacy in communication networks : 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised selected papers / | 1 |
TK5102.85 .S43 2017eb | Security and privacy in communication networks : 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings / | 1 |
TK5102.85 .S53 2014eb | Introduction to information security : a strategic-based approach / | 1 |
TK5102.85 .S73 1995 | Protect your privacy : the PGP user's guide / | 2 |
TK5102.85 .S77 2013eb | Strategic intelligence management national security imperatives and information and communications technologies / | 1 |
TK5102.85 .S86 2016 | Chaotic secure communication : principles and technologies / | 1 |
TK5102.85 .S88 2002eb | Secure communications applications and management / | 1 |
TK5102.85 .T49 2022eb | Securing mobile devices and technology / | 2 |
TK5102.85 .T73 2008 | Security for telecommunications networks / | 1 |
TK5102.85 .T73 2008eb | Security for telecommunications networks | 1 |
TK5102.85 .U55 2003i | The national strategy to secure cyberspace | 1 |
TK5102.85 .W37 1998 | The cyber-posture of the national information infrastructure / | 1 |
TK5102.85 .W37 2004eb |
WarDriving : drive, detect, defend : a guide to wireless security / WarDriving drive, detect, defend : a guide to wireless security / |
2 |
TK5102.85 .W57 2011 | Information security theory and practice security and privacy of mobile devices in wireless communication : 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 : proceedings / | 1 |