//]]>
The Economics of Financial and Medical Identity Theft by Camp, L. Jean. Publication: . XI, 166p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantitative Security Risk Assessment of Enterprise Networks by Ou, Xinming. Publication: . XIII, 28p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bootstrapping Trust in Modern Computers by Parno, Bryan. Publication: . IX, 101p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Data Intensive Computing by Furht, Borko. Publication: . XVIII, 794 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense by Jajodia, Sushil. Publication: . XVI, 184 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Concise Guide to Databases by Lake, Peter. Publication: . XIX, 307 p. 113 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Botnets by Tiirmaa-Klaar, Heli. Publication: . VIII, 97 p. 5 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVIII, 372 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Cloud Computing by Hill, Richard. Publication: . XXI, 278 p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Computer Network Security by Kizza, Joseph Migga. Publication: . XXIV, 521 p. 106 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Embedded Multimedia Security Systems by Pande, Amit. Publication: . XVII, 146 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Security for Cloud Computing by Pearson, Siani. Publication: . XVI, 306 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Similarity and Classification by Cesare, Silvio. Publication: . XIV, 88p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Achieving Systems Safety by Dale, Chris. Publication: . X, 293p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Reliable Distributed Systems by Birman, Kenneth P. Publication: . XXII, 730 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence Management by Akhgar, Babak. Publication: . XVI, 232 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Network Data Analytics by Aggarwal, Charu C. Publication: . XIV, 502p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Driven e-Science by Lin, Simon C. Publication: . XXII, 517p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Preserving Privacy in Data Outsourcing by Foresti, Sara. Publication: . XV, 180 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart