|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security for Wireless Implantable Medical Devices
by Hei, Xiali.
Publication:
. XI, 45 p. 13 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Layer Approaches for Securing Wireless Communication Systems
by Wen, Hong.
Publication:
. X, 83 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SmartData
by Harvey, Inman.
Publication:
. X, 211 p. 33 illus., 10 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Outlier Analysis
by Aggarwal, Charu C.
Publication:
. XV, 446 p. 49 illus., 10 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Iris Biometrics
by Rathgeb, Christian.
Publication:
. XXII, 358 p. 177 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automatic Malware Analysis
by Yin, Heng.
Publication:
. IX, 73 p. 15 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structured Peer-to-Peer Systems
by Korzun, Dmitry.
Publication:
. XXII, 366 p. 84 illus., 45 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Social Networks
by Altshuler, Yaniv.
Publication:
. VI, 253 p. 49 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Survey of Data Leakage Detection and Prevention Solutions
by Shabtai, Asaf.
Publication:
. VIII, 92 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Financial and Medical Identity Theft
by Camp, L. Jean.
Publication:
. XI, 166p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Botnets
by Tiirmaa-Klaar, Heli.
Publication:
. VIII, 97 p. 5 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Similarity and Classification
by Cesare, Silvio.
Publication:
. XIV, 88p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Achieving Systems Safety
by Dale, Chris.
Publication:
. X, 293p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|