|
|
Information Technology Convergence, Secure and Trust Computing, and Data Management
by Park, Jong Hyuk (James).
Publication:
. XXXII, 296 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Proceedings of the International Conference on IT Convergence and Security 2011
by Kim, Kuinam J.
Publication:
. XIV, 642 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
IT Security Management
by Partida, Alberto.
Publication:
. XXXV, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Internet
by Salgarelli, Luca.
Publication:
. XVIII, 369p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Networks and Security
by Khan, Shafiullah.
Publication:
. VIII, 512 p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Information and Communication Security
by Stavroulakis, Peter.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
PBX Security and Forensics
by Androulidakis, Iosif I.
Publication:
. XX, 115 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Phone Security and Forensics
by Androulidakis, Iosif I.
Publication:
. XI, 103 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Embedded Devices
by Gebotys, Catherine H.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Personal Satellite Services
by Pillai, Prashant.
Publication:
. XIV, 197 p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IP Mobility Management for VANET
by Taha, Sanaa.
Publication:
. IX, 106 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Assessment in Vehicular Networks
by Du, Suguo.
Publication:
. XI, 49 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security for Wireless Implantable Medical Devices
by Hei, Xiali.
Publication:
. XI, 45 p. 13 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Layer Approaches for Securing Wireless Communication Systems
by Wen, Hong.
Publication:
. X, 83 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structured Peer-to-Peer Systems
by Korzun, Dmitry.
Publication:
. XXII, 366 p. 84 illus., 45 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|