|
|
Security Protocols XVII
by Christianson, Bruce.
Publication:
. X, 367 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 207p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Analysis of Social Media and Ubiquitous Data
by Atzmueller, Martin.
Publication:
. VIII, 163p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Janssen, Marijn.
Publication:
. XVI, 466 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVI
by Christianson, Bruce.
Publication:
. IX, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 133p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics VII
by Peterson, Gilbert.
Publication:
. XVIII, 290 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Forensics in Telecommunications, Information, and Multimedia
by Lai, Xuejia.
Publication:
. XIII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Baggili, Ibrahim.
Publication:
. X, 157p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics VI
by Chow, Kam-Pui.
Publication:
. XVIII, 311p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Goel, Sanjay.
Publication:
. XII, 171p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|