|
|
Modern Cryptography Primer
by Kościelny, Czesław.
Publication:
. XIV, 238 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security and Privacy
by Felici, Massimo.
Publication:
. XIV, 177 p. 44 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics IX
by Peterson, Gilbert.
Publication:
. XX, 398 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Public Key Infrastructures
by Buchmann, Johannes A.
Publication:
. XV, 194 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Security of Information and Communication Networks
by Awad, Ali Ismail.
Publication:
. XII, 249 p. 104 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Computing and Communications
by Thampi, Sabu M.
Publication:
. XVI, 404 p. 149 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Rogers, Marcus.
Publication:
. XIV, 329 p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Information Security and Privacy
by Böhme, Rainer.
Publication:
. XIII, 321 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Assurance and Security Education and Training
by Dodge, Ronald C.
Publication:
. XII, 297 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust Management VII
by Fernández-Gago, Carmen.
Publication:
. XII, 289 p. 49 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quality, Reliability, Security and Robustness in Heterogeneous Networks
by Singh, Karan.
Publication:
. XVIII, 1011 p. 488 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Fischer-Hübner, Simone.
Publication:
. X, 161 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad Hoc Networks
by Zheng, Jun.
Publication:
. XII, 366 p. 168 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Keromytis, Angelos D.
Publication:
. X, 369 p. 111 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Personal Satellite Services
by Pillai, Prashant.
Publication:
. XIV, 197 p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Computing and Services
by Yuan, Yuyu.
Publication:
. XVIII, 739 p. 301 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection VI
by Butts, Jonathan.
Publication:
. XVI, 233 p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 536 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Gladyshev, Pavel.
Publication:
. XII, 297 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|