|
|
The Economics of Financial and Medical Identity Theft
by Camp, L. Jean.
Publication:
. XI, 166p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bootstrapping Trust in Modern Computers
by Parno, Bryan.
Publication:
. IX, 101p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Data Intensive Computing
by Furht, Borko.
Publication:
. XVIII, 794 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Concise Guide to Databases
by Lake, Peter.
Publication:
. XIX, 307 p. 113 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Botnets
by Tiirmaa-Klaar, Heli.
Publication:
. VIII, 97 p. 5 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ethical and Social Issues in the Information Age
by Kizza, Joseph Migga.
Publication:
. XVIII, 372 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Cloud Computing
by Hill, Richard.
Publication:
. XXI, 278 p. 38 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Computer Network Security
by Kizza, Joseph Migga.
Publication:
. XXIV, 521 p. 106 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Embedded Multimedia Security Systems
by Pande, Amit.
Publication:
. XVII, 146 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Security for Cloud Computing
by Pearson, Siani.
Publication:
. XVI, 306 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Similarity and Classification
by Cesare, Silvio.
Publication:
. XIV, 88p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Achieving Systems Safety
by Dale, Chris.
Publication:
. X, 293p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Reliable Distributed Systems
by Birman, Kenneth P.
Publication:
. XXII, 730 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence Management
by Akhgar, Babak.
Publication:
. XVI, 232 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Network Data Analytics
by Aggarwal, Charu C.
Publication:
. XIV, 502p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Driven e-Science
by Lin, Simon C.
Publication:
. XXII, 517p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Preserving Privacy in Data Outsourcing
by Foresti, Sara.
Publication:
. XV, 180 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|