|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Layer Approaches for Securing Wireless Communication Systems
by Wen, Hong.
Publication:
. X, 83 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structured Peer-to-Peer Systems
by Korzun, Dmitry.
Publication:
. XXII, 366 p. 84 illus., 45 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Social Networks
by Altshuler, Yaniv.
Publication:
. VI, 253 p. 49 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Financial and Medical Identity Theft
by Camp, L. Jean.
Publication:
. XI, 166p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Botnets
by Tiirmaa-Klaar, Heli.
Publication:
. VIII, 97 p. 5 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Insider Threats in Cyber Security
by Probst, Christian W.
Publication:
. XII, 244 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy
by Moore, Tyler.
Publication:
. XVI, 320p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Situational Awareness
by Jajodia, Sushil.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encryption for Digital Content
by Kiayias, Aggelos.
Publication:
. XIII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Intrusion Detection and Prevention
by Ghorbani, Ali A.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Spyware and Adware
by Aycock, John.
Publication:
. XIV, 146 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|