|
|
Security information and event management (SIEM) implementation /
Publication:
New York : McGraw-Hill, 2011
. xxxiv, 430 p. :
24 cm.
Date:2011
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Professional rootkits /
by Vieler, Ric,
Publication:
Indianapolis, Ind : Wiley/Wrox, 2007
. xix, 334 p. :
24 cm.
Date:2007
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion detection in distributed systems : , an abstraction-based approach /
by Ning, Peng.
Publication:
Boston, MA : Kluwer Academic Publishers, 2004
. xvi, 136 p. ;
24 cm.
Date:2004
Availability:
Copies available:
AUM Main Library
(3),
|
|
|
Composition of secure multi-party protocols : , a comprehensive study /
by Lindell, Yehuda.
Publication:
Berlin ; | New York : Springer, 2003
. xvi, 192 p. :
24 cm.
Date:2003
Availability:
Copies available:
AUM Main Library
(3),
|
|
|
Network security : , private communication in a public world /
by Kaufman, Charlie.
Publication:
Delhi : PHI Learning Private, 2013
. xxvi, 713 p. :
24 cm.
Date:2013
Availability:
Copies available:
AUM Main Library
(1),
|
|