|
|
Applications of Algebra to Communications, Control, and Signal Processing
by Boston, Nigel.
Publication:
. XIII, 44p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Survey of Data Leakage Detection and Prevention Solutions
by Shabtai, Asaf.
Publication:
. VIII, 92 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Designing Sorting Networks
by Al-Haj Baddar, Sherenaz W.
Publication:
. XII, 136 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Concise Guide to Databases
by Lake, Peter.
Publication:
. XIX, 307 p. 113 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mapping Scientific Frontiers
by Chen, Chaomei.
Publication:
. XXXVII, 344 p. 232 illus., 148 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Cloud Computing
by Hill, Richard.
Publication:
. XXI, 278 p. 38 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantum Attacks on Public-Key Cryptosystems
by Yan, Song Y.
Publication:
. VIII, 207 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Preserving Privacy in Data Outsourcing
by Foresti, Sara.
Publication:
. XV, 180 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grids and Service-Oriented Architectures for Service Level Agreements
by Wieder, Philipp.
Publication:
. XIII, 171p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Insider Threats in Cyber Security
by Probst, Christian W.
Publication:
. XII, 244 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy
by Moore, Tyler.
Publication:
. XVI, 320p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grids, P2P and Services Computing
by Desprez, Frédéric.
Publication:
. XIV, 202p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive Cryptographic Access Control
by Kayem, Anne V. D. M.
Publication:
. XIV, 138 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Association Rule Hiding for Data Mining
by Gkoulalas-Divanis, Aris.
Publication:
. XX, 138p. 120 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encyclopedia of Cryptography and Security
by van Tilborg, Henk C. A.
Publication:
. XL, 1435p. eReference. In 2 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Situational Awareness
by Jajodia, Sushil.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Production Grids in Asia
by Lin, Simon C.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|