Book titles in this series
-
-
Data Warehousing and Data Mining Techniques for Cyber Security
- Authors:
-
- Anoop Singhal
- Copyright: 2007
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Hop Integrity in the Internet
- Authors:
-
- Chin-Tser Huang
- Mohamed G. Gouda
- Copyright: 2006
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Image and Video Encryption
From Digital Rights Management to Secured Personal Communication
- Authors:
-
- Andreas Uhl
- Andreas Pommer
- Copyright: 2005
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Intrusion Detection Systems
- Editors:
-
- Roberto Di Pietro
- Luigi V. Mancini
- Copyright: 2008
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Malware Detection
- Editors:
-
- Mihai Christodorescu
- Somesh Jha
- Douglas Maughan
- Dawn Song
- Copyright: 2007
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Multivariate Public Key Cryptosystems
- Authors:
-
- Jintai Ding
- Jason E. Gower
- Dieter S. Schmidt
- Copyright: 2006
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Network Security Policies and Procedures
- Authors:
-
- Douglas W. Frye
- Copyright: 2007
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Security for Telecommunications Networks
- Authors:
-
- Patrick Traynor
- Patrick McDaniel
- Thomas La Porta
- Copyright: 2008
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Security for Wireless Sensor Networks
- Authors:
-
- Donggang Liu
- Peng Ning
- Copyright: 2007
Available Renditions
- Hard cover
- Soft cover
- eBook