|
|
Information assurance architecture /
by Willett, Keith D.
Publication:
Boca Raton, FL : CRC Press, 2008
. xxix, 588 p. :
25 cm.
Date:2008
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
IT security metrics : , a practical framework for measuring security & protecting data /
by Hayden, Lance.
Publication:
New York : McGraw Hill, 2010
. xxvii, 368 p. :
24 cm.
Date:2010
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Encyclopedia of information assurance /
Publication:
Boca Raton, FL : Auerbach Publications, 2011
. 4 v. (xlviii, 3192, I-117 p.) :
29 cm.
Date:2011
Availability:
Copies available:
AUM Main Library
(8),
|
|
|
Steganography in digital media : , principles, algorithms, and applications /
by Fridrich, Jessica.
Publication:
Cambridge : Cambridge University Press, 2010
. xxii, 437 p., [4] p. of plates :
26 cm.
Date:2010
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Security metrics : , a beginner's guide /
by Wong, Caroline.
Publication:
New York : McGraw-Hill, 2012
. xxxii, 397 p. :
24 cm.
Date:2012
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Security in computing /
by Pfleeger, Charles P.,
Publication:
Upper Saddle River, N.J : Prentice Hall, 2007
. xxix, 845 p. :
25 cm.
Date:2007
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
System assurance : , beyond detecting vulnerabilities /
by Mansourov, Nikolai
Publication:
Amsterdam : Elseiver, 2011
. xix, 346 p.
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Enterprise information security and privacy /
Publication:
Boston, MA : Artech House, 2009
. xxiv, 231 p. :
Date:2009
Availability:
Copies available:
AUM Main Library
(2),
|
|
|
Mastering system center data protection manager 2007 /
by Ganger, Devin L.
Publication:
Indianapolis, Ind. : Wiley Pub., 2008
. xxii, 482 p. :
24 cm.
Date:2008
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Technology Convergence, Secure and Trust Computing, and Data Management
by Park, Jong Hyuk (James).
Publication:
. XXXII, 296 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Proceedings of the International Conference on IT Convergence and Security 2011
by Kim, Kuinam J.
Publication:
. XIV, 642 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Trends for FPGAS
by Badrignans, Benoit.
Publication:
. XX, 252p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Machine Learning and Systems Engineering
by Ao, Sio-Iong.
Publication:
. XXII, 614 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
IT Security Management
by Partida, Alberto.
Publication:
. XXXV, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Internet
by Salgarelli, Luca.
Publication:
. XVIII, 369p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ISSE 2010 Securing Electronic Business Processes
by Pohlmann, Norbert.
Publication:
. XII, 416 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Networks and Security
by Khan, Shafiullah.
Publication:
. VIII, 512 p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Information and Communication Security
by Stavroulakis, Peter.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced DPA Theory and Practice
by Peeters, Eric.
Publication:
. XVI, 139 p. 70 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Unclonable Functions in Theory and Practice
by Böhm, Christoph.
Publication:
. XVIII, 270 p. 217 illus., 146 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|