//]]>
Security and Privacy in Mobile Social Networks by Liang, Xiaohui. Publication: . VIII, 100 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security for Wireless Implantable Medical Devices by Hei, Xiali. Publication: . XI, 45 p. 13 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Layer Approaches for Securing Wireless Communication Systems by Wen, Hong. Publication: . X, 83 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SmartData by Harvey, Inman. Publication: . X, 211 p. 33 illus., 10 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Outlier Analysis by Aggarwal, Charu C. Publication: . XV, 446 p. 49 illus., 10 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Iris Biometrics by Rathgeb, Christian. Publication: . XXII, 358 p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structured Peer-to-Peer Systems by Korzun, Dmitry. Publication: . XXII, 366 p. 84 illus., 45 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Social Networks by Altshuler, Yaniv. Publication: . VI, 253 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Survey of Data Leakage Detection and Prevention Solutions by Shabtai, Asaf. Publication: . VIII, 92 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Financial and Medical Identity Theft by Camp, L. Jean. Publication: . XI, 166p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantitative Security Risk Assessment of Enterprise Networks by Ou, Xinming. Publication: . XIII, 28p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense by Jajodia, Sushil. Publication: . XVI, 184 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Botnets by Tiirmaa-Klaar, Heli. Publication: . VIII, 97 p. 5 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Similarity and Classification by Cesare, Silvio. Publication: . XIV, 88p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Achieving Systems Safety by Dale, Chris. Publication: . X, 293p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية