|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automatic Malware Analysis
by Yin, Heng.
Publication:
. IX, 73 p. 15 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Financial and Medical Identity Theft
by Camp, L. Jean.
Publication:
. XI, 166p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Biometrics
by Campisi, Patrizio.
Publication:
. X, 438 p. 114 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ethical and Social Issues in the Information Age
by Kizza, Joseph Migga.
Publication:
. XVIII, 372 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Cloud Computing
by Hill, Richard.
Publication:
. XXI, 278 p. 38 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Embedded Multimedia Security Systems
by Pande, Amit.
Publication:
. XVII, 146 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantum Attacks on Public-Key Cryptosystems
by Yan, Song Y.
Publication:
. VIII, 207 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Preserving Privacy in Data Outsourcing
by Foresti, Sara.
Publication:
. XV, 180 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Insider Threats in Cyber Security
by Probst, Christian W.
Publication:
. XII, 244 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive Cryptographic Access Control
by Kayem, Anne V. D. M.
Publication:
. XIV, 138 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encyclopedia of Cryptography and Security
by van Tilborg, Henk C. A.
Publication:
. XL, 1435p. eReference. In 2 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Source Software for Digital Forensics
by Huebner, Ewa.
Publication:
. VII, 117p. 40 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|