|
|
Concise Guide to Databases
by Lake, Peter.
Publication:
. XIX, 307 p. 113 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantum Attacks on Public-Key Cryptosystems
by Yan, Song Y.
Publication:
. VIII, 207 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Preserving Privacy in Data Outsourcing
by Foresti, Sara.
Publication:
. XV, 180 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Insider Threats in Cyber Security
by Probst, Christian W.
Publication:
. XII, 244 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy
by Moore, Tyler.
Publication:
. XVI, 320p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive Cryptographic Access Control
by Kayem, Anne V. D. M.
Publication:
. XIV, 138 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Association Rule Hiding for Data Mining
by Gkoulalas-Divanis, Aris.
Publication:
. XX, 138p. 120 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encyclopedia of Cryptography and Security
by van Tilborg, Henk C. A.
Publication:
. XL, 1435p. eReference. In 2 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Situational Awareness
by Jajodia, Sushil.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encryption for Digital Content
by Kiayias, Aggelos.
Publication:
. XIII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Spyware and Adware
by Aycock, John.
Publication:
. XIV, 146 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Biometrics
by Jain, Anil K.
Publication:
. XVI, 312 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Security
by Huang, Scott C.-H.
Publication:
. XXIII, 300p. 116 illus., 58 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Signatures
by Katz, Jonathan.
Publication:
. XIV, 183p. 8 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theory and Best Practices in the IT Industry
by Mohapatra, Sanjay.
Publication:
. XV, 216p. 34 illus., 17 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Business of iPhone App Development
by Wooldridge, Dave.
Publication:
. 408 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
AdvancED Flex 4
by Tiwari, Shashank.
Publication:
. 560 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Learn Cocoa on the Mac
by Nutting, Jack.
Publication:
. 400 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|