|
|
Introduction to Public Key Infrastructures
by Buchmann, Johannes A.
Publication:
. XV, 194 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Assurance and Security Education and Training
by Dodge, Ronald C.
Publication:
. XII, 297 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Information Security
by Basin, David.
Publication:
. XIV, 202 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model-Driven Risk Analysis
by Lund, Mass Soldal.
Publication:
. XVI, 460p. 196 illus., 30 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|