//]]>
Security information and event management (SIEM) implementation /   Publication: New York : McGraw-Hill, 2011 . xxxiv, 430 p. : 24 cm. Date:2011 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Professional rootkits / by Vieler, Ric, Publication: Indianapolis, Ind : Wiley/Wrox, 2007 . xix, 334 p. : 24 cm. Date:2007 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intrusion detection in distributed systems : , an abstraction-based approach / by Ning, Peng. Publication: Boston, MA : Kluwer Academic Publishers, 2004 . xvi, 136 p. ; 24 cm. Date:2004 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Composition of secure multi-party protocols : , a comprehensive study / by Lindell, Yehuda. Publication: Berlin ; | New York : Springer, 2003 . xvi, 192 p. : 24 cm. Date:2003 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Network security : , private communication in a public world / by Kaufman, Charlie. Publication: Delhi : PHI Learning Private, 2013 . xxvi, 713 p. : 24 cm. Date:2013 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية