Skip to content

Visit tso.co.uk

Networking & Communications

Quick Search

Within:

Search by:

Sort these publications by:

Results Found

The CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems

The CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems

  • Author: Seacord, Robert C.

Not yet published: available to order Availability help (opens in new window)

Save
Add to Basket
Designing Distributed Control Systems: A Pattern Language Approach

Designing Distributed Control Systems: A Pattern Language Approach

  • Author: Eloranta, Veli-Pekka Koskinen...

Not yet published: available to order Availability help (opens in new window)

Save
Add to Basket
Mapping in the Cloud

Mapping in the Cloud

  • Author: Peterson, Michael P.

Not yet published: available to order Availability help (opens in new window)

Save
Add to Basket
Security for Service Oriented Architectures

Security for Service Oriented Architectures

  • Author: Williams, Walter

Not yet published: available to order Availability help (opens in new window)

Save
Add to Basket
Conducting Network Penetration and Espionage in a Global Environment

Conducting Network Penetration and Espionage in a Global Environment

  • Author: Middleton, Bruce

Not yet published: available to order Availability help (opens in new window)

Save
Add to Basket
Stable Throughput Regions in Wireless Networks

Stable Throughput Regions in Wireless Networks

  • Author: Kompella, Sastry Ephremides, ...

Not yet published: available to order Availability help (opens in new window)

Save
Add to Basket
Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

  • Author: Shostack, Adam

Not yet published: available to order Availability help (opens in new window)

Save
Add to Basket
From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence

From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence

  • Author: Tsiatsis, Vlasios Fikouras, I...

Not yet published: available to order Availability help (opens in new window)

Save
Add to Basket
Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware

NewTargeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware

  • Author: Sood, Aditya Enbody, Richard ...

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Save
Add to Basket