|
|
Security and Privacy Preserving in Social Networks
by Chbeir, Richard.
Publication:
. XVI, 367 p. 107 illus., 66 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics IX
by Peterson, Gilbert.
Publication:
. XX, 398 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy Protection in Information Processing Systems
by Janczewski, Lech J.
Publication:
. XIV, 436 p. 117 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Fischer-Hübner, Simone.
Publication:
. X, 161 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Keromytis, Angelos D.
Publication:
. X, 369 p. 111 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Applications for Bio-technology, Multimedia, and Ubiquitous City
by Kim, Tai-hoon.
Publication:
. XXII, 408 p. 239 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Applications for Security, Control and System Engineering
by Kim, Tai-hoon.
Publication:
. XX, 488 p. 228 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information Technology
by Papasratorn, Borworn.
Publication:
. VIII, 199 p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics VIII
by Peterson, Gilbert.
Publication:
. XVIII, 333 p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Rajarajan, Muttukrishnan.
Publication:
. XIV, 548 p. 174 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Identity Management for Life
by Camenisch, Jan.
Publication:
. XIII, 293p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy Research
by Gritzalis, Dimitris.
Publication:
. XI, 578p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust Management VI
by Dimitrakos, Theo.
Publication:
. XIV, 284p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad Hoc Networks
by Simplot-Ryl, David.
Publication:
. VIII, 239p. 123 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Technology
by Kim, Tai-hoon.
Publication:
. Approx. 250 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection V
by Butts, Jonathan.
Publication:
. XIV, 218 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Network Security and Applications
by Wyld, David C.
Publication:
. XVIII, 660 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure and Trust Computing, Data Management and Applications
by Park, James J.
Publication:
. XV, 252 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust Management V
by Wakeman, Ian.
Publication:
. XII, 336 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Challenges in Security and Privacy for Academia and Industry
by Camenisch, Jan.
Publication:
. XIV, 330 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|