Limit search to available items
Nearby BJL CLASSMARKS are:
Result Page   Prev Next
Save marked records Save all on page
Mark   Media Year
TK 5105.585 I6 : IP addressing & subnetting : including IPv6.; BJL     
      IP addressing & subnetting : including IPv6. BJL  BOOK 2000
TK 5105.585 L8    
      TCP/IP clearly explained. BJL  BOOK 1997
      TCP/IP clearly explained. BJL  BOOK 1999
TK 5105.585 S7 : IP routing fundamentals.; BJL     
      IP routing fundamentals. BJL  BOOK c1999
TK 5105.585 S8 : TCP/IP illustrated, volume one : the protocols / W. Richard Stevens.; BJL     
      TCP/IP illustrated, volume one : the protocols / W. Richard Stevens. BJL  BOOK 1999
TK 5105.5865 C7 : WAP servlets.; BJL     
      WAP servlets. BJL  BOOK 2001
TK 5105.5865 E9 : Getting started with WAP and WML / Huw Evans, Paul Ashworth.; BJL     
      Getting started with WAP and WML / Huw Evans, Paul Ashworth. BJL  BOOK 2001
TK 5105.5865 K1 : W-CDMA and cdma2000 for 3G mobile networks / M.R. Karim and M. Sarraf.; BJL     
      W-CDMA and cdma2000 for 3G mobile networks / M.R. Karim and M. Sarraf. BJL  BOOK 2002
TK 5105.5865 N7 : Inside WAP : programming applications with WML and WMLScript.; BJL     
      Inside WAP : programming applications with WML and WMLScript. BJL  BOOK 2001
TK 5105.59 B5 : Web security basics.; BJL     
      Web security basics. BJL  BOOK 2003
TK5105.59 .C364 2019 : Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones.; Online materials     
      Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones. Online materials  EBOOKS 2019
TK 5105.59 C6 : Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring.; BJL     
      Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring. BJL  BOOK 2006
TK 5105.59 C9 : Implementing intrusion detection systems : a hands-on guide for securing the network / Tim Crothers.; BJL     
      Implementing intrusion detection systems : a hands-on guide for securing the network / Tim Crothers. BJL  BOOK 2003
TK 5105.59 E4 : The internet security guidebook : from planning to deployment / Juanita Ellis, Tim Speed.; BJL     
      The internet security guidebook : from planning to deployment / Juanita Ellis, Tim Speed. BJL  BOOK 2001
TK5105.59 .F79 2009 : Security monitoring / Chris Fry and Martin Nystrom.; BJL     
      Security monitoring / Chris Fry and Martin Nystrom. BJL  BOOK c2009
TK 5105.59 G1 : Protocol : how control exists after decentralization / Alexander R. Galloway.; BJL     
      Protocol : how control exists after decentralization / Alexander R. Galloway. BJL  BOOK c2004
TK 5105.59 .G2 : Web security, privacy and commerce / Simson Garfinkel with Gene Spafford.; BJL     
      Web security, privacy and commerce / Simson Garfinkel with Gene Spafford. BJL  BOOK 2002
TK 5105.59 H4    
      Practical computer network security. BJL  BOOK 1995
      Symbian OS platform security : software developing using the Symbian OS security architecture / Craig BJL  BOOK c2006
TK 5105.59 L6 : Information security : a strategic approach / Vincent LeVeque.; BJL     
      Information security : a strategic approach / Vincent LeVeque. BJL  BOOK c2006
TK 5105.59 M1 : Web security for network and system administrators.; BJL     
      Web security for network and system administrators. BJL  BOOK 2003
TK 5105.59 N8 : Network intrusion detection : an analyst's handbook / Stephen Noethcutt, Judy Novak, Donald McLachlan.; BJL     
      Network intrusion detection : an analyst's handbook / Stephen Noethcutt, Judy Novak, Donald McLachlan BJL  BOOK 2000
TK 5105.59 P3 : Security warrior / Cyrus Peikari and Anton Chuvakin.; BJL     
      Security warrior / Cyrus Peikari and Anton Chuvakin. BJL  BOOK c2004
TK 5105.59 S4 : Securing the network from malicious code : a complete guide to defending against viruses, worms and trojans / Douglas Schweitzer.; BJL     
      Securing the network from malicious code : a complete guide to defending against viruses, worms and t BJL  BOOK 2002
TK 5105.59 S6 : Dictionary of information security.; BJL     
      Dictionary of information security. BJL  BOOK 2006
TK 5105.59 S7    
      Cryptography and network security : principles and practice / William Stallings. BJL  BOOK c2006
      Testing web security : assessing the security of web sites and applications. BJL  BOOK 2002
TK 5105.59 S8 : Web security : a step-by-step reference guide / Lincoln D. Stein.; BJL     
      Web security : a step-by-step reference guide / Lincoln D. Stein. BJL  BOOK 1998
TK 5105.59 T6 : Web security.; BJL     
      Web security. BJL  BOOK 1998
TK 5105.59 W3 : Disappearing cryptography : being and nothingness on the Net.; BJL     
      Disappearing cryptography : being and nothingness on the Net. BJL  BOOK 1996
TK 5105.59 W7 : Digital identity / Phillip J. Windley.; BJL     
      Digital identity / Phillip J. Windley. BJL  BOOK 2005
TK5105.6 .S62 2008 : Small tech : the culture of digital tools / Byron Hawk, David M. Rieder, and Ollie Oviedo, editors.; BJL     
      Small tech : the culture of digital tools / Byron Hawk, David M. Rieder, and Ollie Oviedo, editors. BJL  BOOK c2008
TK 5105.7 A6 : The practical guide to local area networks.; BJL     
      The practical guide to local area networks. BJL  BOOK 1986
TK 5105.7 B8    
      [DD 100 : pt.1, 1985] Token bus local area networks; pt.1, technical specification. BJL  BOOK 1985
      [DD 101 : 1986] Open systems interconnection : connection-oriented presentation service definition. BJL  BOOK 1986
      [DD 102 : 1986] Open systems interconnection-oriented presentation protocol specification. BJL  BOOK 1986
      [DD 103 : 1986] Open systems interconnection : specification of "Abstract syntax notation, one" (ASN. BJL  BOOK 1986
22 additional entries    
TK 5105.7 C9 : LANs explained : a guide to local area networks.; BJL     
      LANs explained : a guide to local area networks. BJL  BOOK 1988
TK 5105.7 H3 : Troubleshooting local area networks / S. Harris, S. Nugus, D. Morgan.; BJL     
      Troubleshooting local area networks / S. Harris, S. Nugus, D. Morgan. BJL  BOOK 1992
TK 5105.7 H7 : Local area network design.; BJL     
      Local area network design. BJL  BOOK 1986
TK 5105.7 I5    
      ANSI/IEEE Std 802.5 - 1985 : ISO Draft Proposal 8802/5 : ... Token ring access method and physical la Departmental Locations  BOOK 1985
      Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer spe BJL  BOOK 1985
      Token-passing bus access method and physical layer specifications : IEEE standards for local area net BJL  BOOK 1985
TK 5105.7 I8 : Issues in LAN management : proceedings of the IFIP TC6/WG6, 4a International Symposium on the Management of Local Communications Systems, Canterbury, U.K., 18-19 September, 1990 / edited by I.N. Dallas, E.B. Spratt, J.-P. Cabanel.; BJL     
      Issues in LAN management : proceedings of the IFIP TC6/WG6, 4a International Symposium on the Managem BJL  BOOK 1991
TK 5105.7 M1    
      Implementing PC LANs. BJL  BOOK 1991
      LANs : applications of IEEE/ANSI 802 standards. BJL  BOOK 1989
TK 5105.7 N2 : High-capacity local and metropolitan area networks : architecture and performance issues : [proceedings] of the NATO advanced research workshop ... Sophia Antipolis, France, June 25-27, 1990 / edited by G. Pujolle.; BJL     
      High-capacity local and metropolitan area networks : architecture and performance issues : [proceedin BJL  BOOK 1991
TK 5105.7 N4 S3 : C programmmer's guide to NetBIOS.; Departmental Locations     
      C programmmer's guide to NetBIOS. Departmental Locations  BOOK 1988
TK5105.7 .S77 1997 : Local and metropolitan area networks / William Stallings.; BJL     
      Local and metropolitan area networks / William Stallings. BJL  BOOK c1997
TK 5105.73 I5 : Instant messaging systems / Dreamtech Software Team.; BJL     
      Instant messaging systems / Dreamtech Software Team. BJL  BOOK 2002
TK 5105.73 M9 : Removing the spam : email processing and filtering / Geoff Mulligan.; BJL     
      Removing the spam : email processing and filtering / Geoff Mulligan. BJL  BOOK 1999
TK 5105.73 P1 : Electronic mail.; BJL     
      Electronic mail. BJL  BOOK 1995
TK 5105.73 W2 : E-mail for English teaching : bringing the Internet and computer learning networks into the language classroom.; BJL     
      E-mail for English teaching : bringing the Internet and computer learning networks into the language BJL  BOOK 1995
TK 5105.8 A8 C4 : MIT project Athena : a model for distributed campus computing.; BJL     
      MIT project Athena : a model for distributed campus computing. BJL  BOOK 1991
TK 5105.8 V5 B4 : Cyberspace : first steps / edited by Michael Benedikt.; BJL     
      Cyberspace : first steps / edited by Michael Benedikt. BJL  BOOK 1991
TK 5105.8 V5 P4 : VRML browsing and building cyberspace.; BJL     
      VRML browsing and building cyberspace. BJL  BOOK 1995
TK5105.83 : Building virtual communities : learning and change in cyberspace / edited by K. Ann Renninger, Wesley Shumar.; BJL     
      Building virtual communities : learning and change in cyberspace / edited by K. Ann Renninger, Wesley BJL  BOOK 2002
TK 5105.83 K4 : Community building on the Web.; BJL     
      Community building on the Web. BJL  BOOK 2000
TK 5105.83 O55 2001 : Online communities : commerce, community action and the virtual university / edited by Chris Werry and Miranda Mowbray.; BJL     
      Online communities : commerce, community action and the virtual university / edited by Chris Werry an BJL  BOOK 2001
Save marked records Save all on page
Result Page   Prev Next