|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automatic Malware Analysis
by Yin, Heng.
Publication:
. IX, 73 p. 15 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Robustness under Large-Scale Attacks
by Zhou, Qing.
Publication:
. VIII, 41 p. 12 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data-Driven Methods for Adaptive Spoken Dialogue Systems
by Lemon, Oliver.
Publication:
. IX, 177 p. 35 illus., 8 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Mining Applications Using Artificial Adaptive Systems
by Tastle, William J.
Publication:
. VII, 275 p. 135 illus., 111 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applications of Algebra to Communications, Control, and Signal Processing
by Boston, Nigel.
Publication:
. XIII, 44p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Survey of Data Leakage Detection and Prevention Solutions
by Shabtai, Asaf.
Publication:
. VIII, 92 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Designing Sorting Networks
by Al-Haj Baddar, Sherenaz W.
Publication:
. XII, 136 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Concise Guide to Databases
by Lake, Peter.
Publication:
. XIX, 307 p. 113 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mapping Scientific Frontiers
by Chen, Chaomei.
Publication:
. XXXVII, 344 p. 232 illus., 148 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Cloud Computing
by Hill, Richard.
Publication:
. XXI, 278 p. 38 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantum Attacks on Public-Key Cryptosystems
by Yan, Song Y.
Publication:
. VIII, 207 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Preserving Privacy in Data Outsourcing
by Foresti, Sara.
Publication:
. XV, 180 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grids and Service-Oriented Architectures for Service Level Agreements
by Wieder, Philipp.
Publication:
. XIII, 171p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Insider Threats in Cyber Security
by Probst, Christian W.
Publication:
. XII, 244 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|