|
|
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks
by Raghavan, S.V.
Publication:
. XVI, 348 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ISSE 2009 Securing Electronic Business Processes
by Pohlmann, Norbert.
Publication:
. XVI, 368p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Flow Based Security Control Beyond RBAC
by Fischer-Hellmann, Klaus-Peter.
Publication:
. XXI, 161 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Linguistic Identity Matching
by Lisbach, Bertrand.
Publication:
. XVII, 244 p. 8 illus., 4 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy Preserving in Social Networks
by Chbeir, Richard.
Publication:
. XVI, 367 p. 107 illus., 66 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Information Reuse and Integration
by Özyer, Tansel.
Publication:
. XVI, 400 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Counterterrorism and Open Source Intelligence
by Wiil, Uffe Kock.
Publication:
. XVIII, 458 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ISSE 2013 Securing Electronic Business Processes
by Reimer, Helmut.
Publication:
. XV, 282 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Games for Health
by Schouten, Ben.
Publication:
. XI, 308 p. 83 illus., 70 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multilayered Security and Privacy Protection in Car-to-X Networks
by Stübing, Hagen.
Publication:
. XVII, 191 p. 82 illus., 26 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Internet Technologies
by Su, Jinshu.
Publication:
. XII, 277 p. 132 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection VII
by Butts, Jonathan.
Publication:
. XVI, 227 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Information Systems Workshops
by Abramowicz, Witold.
Publication:
. XXIV, 315 p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Practice of Enterprise Modeling
by Grabis, Janis.
Publication:
. XIV, 293 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Multimedia Surveillance
by Atrey, Pradeep K.
Publication:
. IX, 192 p. 76 illus., 57 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modern Cryptography Primer
by Kościelny, Czesław.
Publication:
. XIV, 238 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security and Privacy
by Felici, Massimo.
Publication:
. XIV, 177 p. 44 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics IX
by Peterson, Gilbert.
Publication:
. XX, 398 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems: Development, Learning, Security
by Wrycza, Stanisław.
Publication:
. XII, 95 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Public Key Infrastructures
by Buchmann, Johannes A.
Publication:
. XV, 194 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|