Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Analysis Techniques for Information Security

Analysis Techniques for Information Security

Anupam Datta, David Melski, Somesh Jha, Ninghui Li

3.0(2)on Goodreads

Details

OL Work ID
OL27326344W

Subjects

Computer securityMathematical modelsData protection

Find this book

GoodreadsOpen Library
Book data from Open Library. Cover images courtesy of Open Library.