|
|
Securing Digital Video
by Diehl, Eric.
Publication:
. X, 264 p. 99 illus., 11 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Leeuw, Elisabeth.
Publication:
. X, 145p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection IV
by Moore, Tyler.
Publication:
. XVIII, 260p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad Hoc Networks
by Zheng, Jun.
Publication:
. XVI, 915p. 450 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Digital Forensics
by Weerasinghe, Dasun.
Publication:
. 196p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Emerging Wireless Communication and Networking Systems
by Gu, Qijun.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding Cryptography
by Paar, Christof.
Publication:
. XVIII, 372p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Practical Signcryption
by Dent, Alexander W.
Publication:
. XVIII, 274 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Operational Semantics and Verification of Security Protocols
by Cremers, Cas.
Publication:
. XIII, 172 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security
by Martellini, Maurizio.
Publication:
. XIV, 72 p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automatic Malware Analysis
by Yin, Heng.
Publication:
. IX, 73 p. 15 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Survey of Data Leakage Detection and Prevention Solutions
by Shabtai, Asaf.
Publication:
. VIII, 92 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Concise Guide to Databases
by Lake, Peter.
Publication:
. XIX, 307 p. 113 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Preserving Privacy in Data Outsourcing
by Foresti, Sara.
Publication:
. XV, 180 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|