Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer networks
Electronic books
(155)
Data transmission systems
(91)
Congresses
(59)
Local area networks (Computer networks)
(52)
Computer network protocols
(47)
more ...
Additional Suggested Topics
... within your search.
Internetworking (Telecommunication)
(45)
Internet
(43)
Telecommunication systems
(43)
Computer security
(42)
เครือข่ายคอมพิวเตอร์
(40)
Telecommunication
(37)
Wireless communication systems
(32)
Security measures
(28)
TCP/IP (Computer network protocol)
(28)
Congresses and conventions
(26)
Information technology
(25)
Computer network architectures
(24)
Electronic book
(21)
Digital communications
(18)
Telecommunications engineers
(18)
Internet (Computer network)
(17)
Routing
(15)
Electronic data processing personnel
(14)
ข่ายงานคอมพิวเตอร์
(13)
Artificial intelligence
(11)
Business enterprises
(11)
Computer network security
(10)
Database management
(10)
Electronic commerce
(10)
less ...
Showing
101
-
120
of
798
for search:
''
, query time: 0.63s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Network security technologies
by
Fung, K. T.
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Official (ISC)2 guide to the SSCP CBK
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Managing a network vulnerability assessment
by
Peltier, Thomas R.
Published 2003
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Network perimeter security building defense in-depth /
by
Riggs, Cliff.
Published 2004
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Network design management and technical perspectives /
by
Piliouras, Teresa C. Mann
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Mechanics of user identification and authentication fundamentals of identity management /
by
Todorov, Dobromir.
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Network design principles and applications /
Published 2000
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
High-speed Cisco networks
by
Vacca, John R
Published 2002
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Handbook of IPv4 to IPv6 transition methodologies for institutional and corporate networks /
by
Amoss, John
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
GMPLS technologies broadband backbone networks and systems /
by
Yamanaka, Naoaki.
Published 2006
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Audit and trace log management consolidation and analysis /
by
Maier, Phillip Q
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Complete book of remote access connectivity and security /
Published 2003
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Computer network time synchronization the network time protocol /
by
Mills, David L
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Communication protocol engineering
by
Popovic, Miroslav
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Business strategies for the next-generation network
by
Seel, Nigel
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Active and programmable networks for adaptive architectures and services
by
Hussain, Syed Asad
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Architecting the telecommunication evolution toward converged network services /
by
Gurbani, Vijay K.
Published 2007
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
A practical guide to content delivery networks
by
Held, Gilbert
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Enhancing computer security with smart technology
Published 2006
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Disruptive security technologies with mobile code and peer-to-peer networks
by
Brooks, R.R
Published 2004
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
[1]
« Prev
1
2
3
4
5
6
7
8
9
10
11
Next »
[40]
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Call Number: T - Technology
Suggested Topics: Computer networks
Institution
KMUTT
(798)
Library
mai
(315)
zzz
(8)
bkt
(5)
Format
MONOGRAPHS
(259)
EBOOKS
(68)
PROCEEDINGS
(1)
Call Number
T - Technology
Author
Stallings, William
(17)
Comer, Douglas E
(13)
Forouzan, Behrouz A
(7)
Kurose, James F
(7)
Black, Uyless
(5)
more ...
Held, Gilbert
(5)
Odom, Wendell
(5)
Tanenbaum, Andrew S
(5)
Minoli, Daniel
(4)
Peterson, Larry L
(4)
ธวัชชัย ชมศิริ
(4)
Dean, Tamara
(3)
Derfler, Frank J
(3)
Panko, Raymond R
(3)
Tavani, Herman T
(3)
Taylor, Ed
(3)
Vacca, John R
(3)
White, Curt M
(3)
จตุชัย แพงจันทร์
(3)
วิรินทร์ เมฆประดิษฐสิน
(3)
โอภาส เอี่ยมสิริวงศ์
(3)
Aboelela, Emad
(2)
Bejtlich, Richard
(2)
Binh, Le Nguyen
(2)
Chao, Lee
(2)
Chorafas, Dimitris N
(2)
Deal, Richard A
(2)
Donahue, Gary A
(2)
Donoso, Yezid
(2)
Empson, Scott
(2)
less ...
Language
English
(741)
Thai
(57)
Genre
Electronic books
(20)
Case studies
(1)
Congresses
(1)
Examinations
(1)
Study guides
(1)
Region
United States
(1)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website