88  results:
?
1

Trusted computing 

principles and applications  Advances in computer science ; volume 2
Copies:  Zentrale:E02 a inf 240 e/979
 
?
2

Quality of transaction 

Communication networks and computer engineering report ; no. 116
Copies:  Zentrale:Magazin 03.a.7148
 
?
3

A reconfiguration method for energy-efficient operation of .. 

Communication networks and computer engineering report ; no. 113
Feller, Frank , [2016]
Copies:  Zentrale:Magazin 02.n.7836
 
?
4

Cooperative vehicular communications in the drive-thru inte.. 

Springer briefs in electrical and computer engineering
Copies:  Zentrale:E02 a inf 226 e/667
 
?
5

Entwurf und Analyse von Kommunikationsnetzen 

Netzplanung - Wartesysteme - Network Calculus  Lehrbuch
Killat, Ulrich - 2., überarbeitete und erweiterte Auflage . , [2015]
Copies:  Zentrale:E02 a inf 470 que/233(2)
 
?
6

Computer architecture and security 

fundamentals of designing secure computer systems  Information security series
Copies:  Zentrale:E02 a inf 100 ef/645
 
?
7

QoS management of web services 

Advanced topics in science and technology in China
Copies:  Zentrale:E02 a inf 240 e/411
 
?
8

Dynamic provisioning for community services 

Advanced topics in science and technology in China
Qi, Li ; Jin, Hai , 2013
Copies:  Zentrale:E02 a inf 220 cls/951
 
?
9

Das Nagios/Icinga-Kochbuch 

[Monitoring für Systemadministratoren]  Monitoring für Systemadministratoren
Kucza, Timo ; Staudemeyer, Ralf - 1. Aufl. . , c 2013
Copies:  Zentrale:E02 a inf 240 x/591; :TB Technik n 478/213
 
?
10

Performance-Optimierung 

Systeme, Anwendungen, Geschäftsprozesse  X.Systems.press
Copies:  Zentrale:E02 a inf 240 e/185
 
?
11

Guide to reliable distributed systems 

building high-assurance applications and cloud-hosted servi...  Texts in computer science
Copies:  Zentrale:E02 a inf 220 cls/391
 
?
12

Technologies and protocols for the future of Internet desig 

reinventing the Web  Premier reference source
Copies:  Zentrale:E02 a inf 220 int/926
 
?
13

Service availability 

principles and practice 
Copies:  Zentrale:E02 a inf 240 e/870
 
?
14

Funktionale Sicherheit 

Grundzüge sicherheitstechnischer Systeme  Praxis
Börcsök, Josef - 3., überarb. Aufl. . , 2011
Copies:  Zentrale:E02 a ing 044.5 e/310(3)
 
?
15

Mining and control of network traffic by computational inte.. 

Studies in computational intelligence ; Vol. 342
Copies:  Zentrale:E02 a inf 710 e/168
 
1-15