//]]>
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks by Tang, Jin. Publication: . X, 86 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Financial and Medical Identity Theft by Camp, L. Jean. Publication: . XI, 166p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense by Jajodia, Sushil. Publication: . XVI, 184 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Biometrics by Campisi, Patrizio. Publication: . X, 438 p. 114 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVIII, 372 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Cloud Computing by Hill, Richard. Publication: . XXI, 278 p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Embedded Multimedia Security Systems by Pande, Amit. Publication: . XVII, 146 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Identity-Based Encryption by Chatterjee, Sanjit. Publication: . XI, 182p. 19 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantum Attacks on Public-Key Cryptosystems by Yan, Song Y. Publication: . VIII, 207 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Preserving Privacy in Data Outsourcing by Foresti, Sara. Publication: . XV, 180 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive Cryptographic Access Control by Kayem, Anne V. D. M. Publication: . XIV, 138 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encyclopedia of Cryptography and Security by van Tilborg, Henk C. A. Publication: . XL, 1435p. eReference. In 2 volumes, not available separately. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software for Digital Forensics by Huebner, Ewa. Publication: . VII, 117p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart