|
|
Handbook of financial cryptography and security /
Publication:
Boca Raton, FL : Chapman & Hall/CRC, 2011
. xxvi, 605 p. :
27 cm.
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Host Identity Protocol (HIP) : , towards the secure mobile Internet /
by Gurtov, Andrei.
Publication:
Chichester, England : Wiley, 2008
. x, 295 p. :
26 cm.
Date:2008
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Windows forensics : , the field guide for conducting corporate computer investigations /
by Steel, Chad,
Publication:
Indianapolis, Ind : Wiley, 2006
. xvii, 382 p. :
24 cm.
Date:2006
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
IoT and edge computing for architects : , implementing edge and IoT systems from sensors to clouds with communication systems, analytics, and security /
by Lea, Perry,
Publication:
Birmingham : Packt Publishing, Limited, 2020
. xviii, 606 p. :
24 cm.
Date:2020
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Deep learning approaches for security threats in IoT environments /
by Abdel-Basset, Mohamed,
Publication:
Hoboken, New Jersey : John Wiley & Sons, Inc., 2023
. xvi, 368 p. :
23 cm.
Date:2023
Availability:
Copies available:
AUM Main Library
(1),
|
|