//]]>
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software for Digital Forensics by Huebner, Ewa. Publication: . VII, 117p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Situational Awareness by Jajodia, Sushil. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encryption for Digital Content by Kiayias, Aggelos. Publication: . XIII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Elements of Computer Security by Salomon, David. Publication: . XX, 375p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Intrusion Detection and Prevention by Ghorbani, Ali A. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Spyware and Adware by Aycock, John. Publication: . XIV, 146 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart