|
|
Advances in Digital Forensics VIII
by Peterson, Gilbert.
Publication:
. XVIII, 333 p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Rajarajan, Muttukrishnan.
Publication:
. XIV, 548 p. 174 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection V
by Butts, Jonathan.
Publication:
. XIV, 218 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure and Trust Computing, Data Management and Applications
by Park, James J.
Publication:
. XV, 252 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Digital Forensics
by Weerasinghe, Dasun.
Publication:
. 196p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Emerging Wireless Communication and Networking Systems
by Gu, Qijun.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Zia, Tanveer.
Publication:
. XII, 420 p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and the Networked Society
by Gregory, Mark A.
Publication:
. XVI, 297 p. 62 illus., 59 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security
by Martellini, Maurizio.
Publication:
. XIV, 72 p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Security Management
by Al-Shaer, Ehab.
Publication:
. VIII, 187 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Assessment in Vehicular Networks
by Du, Suguo.
Publication:
. XI, 49 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automatic Malware Analysis
by Yin, Heng.
Publication:
. IX, 73 p. 15 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Financial and Medical Identity Theft
by Camp, L. Jean.
Publication:
. XI, 166p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|