|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Jajodia, Sushil.
Publication:
. XV, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXIV
by Foresti, Sara.
Publication:
. XIII, 376p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Jajodia, Sushil.
Publication:
. XIII, 500p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encyclopedia of Cryptography and Security
by van Tilborg, Henk C. A.
Publication:
. XL, 1435p. eReference. In 2 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Situational Awareness
by Jajodia, Sushil.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and applications security XIX : , 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005 : proceedings /
Publication:
Berlin : Springer, 2005
. x, 352 p. :
24 cm.
Date:2005
Availability:
Copies available:
AUM Main Library
(3),
|
|