//]]>
Secure IT Systems by Jøsang, Audun. Publication: . X, 247 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encyclopedia of Cryptography and Security by van Tilborg, Henk C. A. Publication: . XL, 1435p. eReference. In 2 volumes, not available separately. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Intrusion Detection and Prevention by Ghorbani, Ali A. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Biometrics by Jain, Anil K. Publication: . XVI, 312 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing Risk and Information Security by Harkins, Malcolm. Publication: . XVII, 152 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart