|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Flegel, Ulrich.
Publication:
. X, 243 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Network Security
by Kotenko, Igor.
Publication:
. XIV, 319 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling and Mining Ubiquitous Social Media
by Atzmueller, Martin.
Publication:
. XII, 183 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 536 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Gladyshev, Pavel.
Publication:
. XII, 297 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Information and Communication Systems
by Schmidt, Andreas U.
Publication:
. VIII, 130 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Data Intensive Computing
by Furht, Borko.
Publication:
. XVIII, 794 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Cloud Computing
by Hill, Richard.
Publication:
. XXI, 278 p. 38 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Security for Cloud Computing
by Pearson, Siani.
Publication:
. XVI, 306 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Reliable Distributed Systems
by Birman, Kenneth P.
Publication:
. XXII, 730 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|