//]]>
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IP Mobility Management for VANET by Taha, Sanaa. Publication: . IX, 106 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Assessment in Vehicular Networks by Du, Suguo. Publication: . XI, 49 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks by Tang, Jin. Publication: . X, 86 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Mobile Social Networks by Liang, Xiaohui. Publication: . VIII, 100 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security for Wireless Implantable Medical Devices by Hei, Xiali. Publication: . XI, 45 p. 13 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Layer Approaches for Securing Wireless Communication Systems by Wen, Hong. Publication: . X, 83 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Survey of Data Leakage Detection and Prevention Solutions by Shabtai, Asaf. Publication: . VIII, 92 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantitative Security Risk Assessment of Enterprise Networks by Ou, Xinming. Publication: . XIII, 28p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bootstrapping Trust in Modern Computers by Parno, Bryan. Publication: . IX, 101p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Similarity and Classification by Cesare, Silvio. Publication: . XIV, 88p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية