|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model Driven Engineering Languages and Systems
by Whittle, Jon.
Publication:
. XX, 730 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model Driven Engineering Languages and Systems
by Petriu, Dorina C.
Publication:
. XXI, 424p. 173 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model Driven Engineering Languages and Systems
by Petriu, Dorina C.
Publication:
. XXI, 422p. 162 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Gladyshev, Pavel.
Publication:
. XII, 297 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Information and Communication Systems
by Schmidt, Andreas U.
Publication:
. VIII, 130 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Security for Cloud Computing
by Pearson, Siani.
Publication:
. XVI, 306 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Software Development
by Langer, Arthur M.
Publication:
. XVIII, 354 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|