Book titles in this series
-
-
Insider Attack and Cyber Security
Beyond the Hacker
- Editors:
-
- Salvatore J. Stolfo
- Steven M. Bellovin
- Shlomo Hershkop
- Angelos D. Keromytis
- Copyright: 2008
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Intrusion Detection and Correlation
Challenges and Solutions
- Authors:
-
- Christopher Kruegel
- Fredrik Valeur
- Giovanni Vigna
- Copyright: 2005
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Preserving Privacy in On-Line Analytical Processing (OLAP)
- Authors:
-
- Lingyu Wang
- Sushil Jajodia
- Duminda Wijesekera
- Copyright: 2007
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Privacy Preserving Data Mining
- Authors:
-
- Jaideep Vaidya
- Christopher W. Clifton
- Yu Michael Zhu
- Copyright: 2006
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Privacy-Respecting Intrusion Detection
- Authors:
-
- Ulrich Flegel
- Copyright: 2007
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
- Editors:
-
- Radha Poovendran
- Cliff Wang
- Sumit Roy
- Copyright: 2007
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Vulnerability Analysis and Defense for the Internet
- Editors:
-
- Abhishek Singh
- Copyright: 2008
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Identifying Malicious Code Through Reverse Engineering
- Editors:
-
- Abhishek Singh
- Copyright: 2009
Available Renditions
- Hard cover
- eBook