|
|
Information Technology Convergence, Secure and Trust Computing, and Data Management
by Park, Jong Hyuk (James).
Publication:
. XXXII, 296 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Video and Audio Broadcasting Technology
by Fischer, Walter.
Publication:
. XXVII, 800p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Information and Communication Security
by Stavroulakis, Peter.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy-Preserving Machine Learning for Speech Processing
by Pathak, Manas A.
Publication:
. XVII, 141 p. 21 illus., 13 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Securing Wireless Communications at the Physical Layer
by Liu, Ruoheng.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Optimization
by Pahl, Julia.
Publication:
. XIV, 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Two-Party Computation Protocols
by Schneider, Thomas.
Publication:
. XVI, 138 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Robustness under Large-Scale Attacks
by Zhou, Qing.
Publication:
. VIII, 41 p. 12 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Signatures
by Katz, Jonathan.
Publication:
. XIV, 183p. 8 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|