//]]>
Cyber Situational Awareness by Jajodia, Sushil. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encryption for Digital Content by Kiayias, Aggelos. Publication: . XIII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Elements of Computer Security by Salomon, David. Publication: . XX, 375p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Intrusion Detection and Prevention by Ghorbani, Ali A. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Spyware and Adware by Aycock, John. Publication: . XIV, 146 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Biometrics by Jain, Anil K. Publication: . XVI, 312 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Security by Huang, Scott C.-H. Publication: . XXIII, 300p. 116 illus., 58 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Signatures by Katz, Jonathan. Publication: . XIV, 183p. 8 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Camenisch, Jan. Publication: . XXIV, 512p. 122 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intel® Trusted Execution Technology for Server Platforms by Futral, William. Publication: . XVII, 156 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing Risk and Information Security by Harkins, Malcolm. Publication: . XVII, 152 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Expert Oracle Application Express Security by Spendolini, Scott. Publication: . XXIV, 296 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Apps Security by Gunasekera, Sheran. Publication: . XVII, 248 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Expert Oracle and Java Security by Coffin, David. Publication: . XXVI, 472 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
iOS Forensic Analysis for iPhone, iPad, and iPod touch by Morrissey, Sean. Publication: . XIV, 372 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pro PHP Security by Snyder, Chris. Publication: . XVIII, 368 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data privacy and security / by Salomon, David Publication: New York : Springer, 2003 . xiv, 465 p. : 24 cm. Date:2003 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart