|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
1 |
Granados, Oscar M |
Corruption Networks |
I11782 |
2021 |
eBook |
|
2 |
Akira Namatame and Shu-Heng Chen |
Agent-based modeling and network dynamics |
OB1127 |
|
eBook |
|
3 |
Guido Caldarelli |
Data science and complex networks |
OB1034 |
|
eBook |
|
4 |
Andrew S. Tanenbaum |
Computer networks |
PP0013 |
2011 |
Book |
|
5 |
James F.Kurose |
Computer networking: a top- down approach |
PP0014 |
2017 |
Book |
|
6 |
Richard R. Brooks |
Introduction to computer and network security: Navigating Shades of Gray |
025955 |
2014 |
Book |
|
7 |
Ajit Pal |
Data communication and computer networks |
025540 |
2014 |
Book |
|
8 |
Shivendra Panwar |
TCP/IP essentials : A lab-based approach |
020317 |
2004 |
Book |
|
9 |
Michael Santifaller |
TCP/IP and NFS: Internetworking in a UNIX environment |
011107 |
1991 |
Book |
|
10 |
Douglas E. Comer |
Internetworking with TCP/IP: Vol. 2: Design, implementation, and internals |
010507 |
1991 |
Book |
|
|
1.
|
 |
Title | Corruption Networks : Concepts and Applications |
Author(s) | Granados, Oscar M;Nicol??s-Carlock, Jos?? R |
Publication | Cham, Springer International Publishing, 2021. |
Description | XVI, 158 p. 40 illus., 34 illus. in color : online resource |
Abstract Note | This book aims to gather the insight of leading experts on corruption and anti-corruption studies working at the scientific frontier of this phenomenon using the multidisciplinary tools of data and network science, in order to present current theoretical, empirical, and operational efforts being performed in order to curb this problem. The research results strengthen the importance of evidence-based approaches in the fight against corruption in all its forms, and foster the discussion about the best ways to convert the obtained knowledge into public policy. The contributed chapters provide comprehensive and multidisciplinary approaches to handle the non-trivial structural and dynamical aspects that characterize the modern social, economic, political and technological systems where corruption takes place. This book will serve a broad multi-disciplinary audience from natural to social scientists, applied mathematicians, including law and policymakers |
ISBN,Price | 9783030814847 |
Keyword(s) | 1. COMPLEX SYSTEMS
2. COMPUTATIONAL COMPLEXITY
3. COMPUTER NETWORKS
4. EBOOK
5. EBOOK - SPRINGER
6. Mathematics in Business, Economics and Finance
7. Political planning
8. POLITICAL SCIENCE
9. Public policy
10. Social sciences???Mathematics
11. SYSTEM THEORY
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I11782 |
|
|
On Shelf |
|
|
|
|
6.
|
 |
Title | Introduction to computer and network security: Navigating Shades of Gray |
Author(s) | Richard R. Brooks |
Publication | Boca Taton, CRC Press, 2014. |
Description | xxiv, 205p. |
Abstract Note | Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security.
The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems. |
ISBN,Price | 9781439860717 : UKP 49.99(HB) |
Classification | 681.324
|
Keyword(s) | 1. COMPUTER NETWORK SECURITY
2. COMPUTER NETWORKS
3. CRYPTOGRAPHY
4. NETWORK SECURITY
5. POLYMORPHIC VIRUS
6. WEB SECURITY
|
Item Type | Book |
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
025955 |
|
681.324/BRO/025955 |
On Shelf |
|
|
|
+Copy Specific Information | |