|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Flegel, Ulrich.
Publication:
. X, 243 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Network Security
by Kotenko, Igor.
Publication:
. XIV, 319 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 536 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Gladyshev, Pavel.
Publication:
. XII, 297 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Information and Communication Systems
by Schmidt, Andreas U.
Publication:
. VIII, 130 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|