|
|
Counterterrorism and Cybersecurity
by Lee, Newton.
Publication:
. XII, 234 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Outlier Analysis
by Aggarwal, Charu C.
Publication:
. XV, 446 p. 49 illus., 10 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
by Subrahmanian, V.S.
Publication:
. XIV, 231 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mining Text Data
by Aggarwal, Charu C.
Publication:
. XI, 522p. 37 illus., 10 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Domain Driven Data Mining
by Cao, Longbing.
Publication:
. XIII, 237p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Dark Web
by Chen, Hsinchun.
Publication:
. XXVI, 454 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Informatics
by Yang, Christopher C.
Publication:
. VI, 206p. 120 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|