651. Modeling and evaluating denial of service attacks for wireless and mobile applications. (2015) Authors: Lu, Zhuo; Wang, Wenye; Wang, Cliff Record Type: Book Extent: 1 online resource (xiii, 116 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
652. Elements of cloud computing security : a survey of key practicalities /: a survey of key practicalities. (2016) Authors: Alani, Mohammed M Record Type: Book Extent: 1 online resource (xi, 55 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
653. Fundamental computing forensics for Africa : a case study of the science in Nigeria /: a case study of the science in Nigeria. ([2018]) Authors: Iorliam, Aamo Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
654. Elements of cloud storage security : concepts, designs and optimized practices /: concepts, designs and optimized practices. ([2016]) Other Names: Galibus, Tatiana; Krasnoproshin, Viktor V; Albuquerque, Robson de Oliveira; Pignaton de Freitas, Edison Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
655. Compilation for secure multi-party computation. (2017) Authors: Büscher, Niklas; Katzenbeisser, Stefan Record Type: Book Extent: 1 online resource (93 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
656. Traceback and anonymity. (2015) Authors: Wang, Xinyuan; Reeves, Douglas B, 1953- Record Type: Book Extent: 1 online resource (vi, 80 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
657. Handbook of mobile data privacy. ([2018]) Editors: Gkoulalas-Divanis, Aris; Bettini, Claudio, 1963- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
658. Homomorphic signature schemes : a survey /: a survey. (2016) Authors: Traverso, Giulia; Demirel, Denise; Buchmann, Johannes Record Type: Book Extent: 1 online resource (xi, 64 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
659. Android application security : a semantics and context-aware approach /: a semantics and context-aware approach. (2016) Authors: Zhang, Mu; Yin, Heng Record Type: Book Extent: 1 online resource (105 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
660. Artificial intelligence tools for cyber attribution. (2018) Authors: Nunes, Eric; Shakarian, Paulo; Simari, Gerardo I; Ruef, Andrew Record Type: Book Extent: 1 online resource (viii, 91 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗