//]]>
Security and Trust Management by Meadows, Catherine. Publication: . X, 239p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Services and Formal Methods by Carbone, Marco. Publication: . IX, 143 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Petkova-Nikova, Svetla. Publication: . X, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Snoeyink, Jack. Publication: . XVII, 370 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communication Technologies for Vehicles by Vinel, Alexey. Publication: . XII, 188 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Models in Software Engineering by Kienzle, Jörg. Publication: . X, 292 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Laud, Peeter. Publication: . X, 273 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Barthe, Gilles. Publication: . X, 279 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Ryan, Mark D. Publication: . XIII, 406p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral - Cultural Modeling and Prediction by Yang, Shanchieh Jay. Publication: . XIV, 366p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2012 by Pointcheval, David. Publication: . XIV, 758 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection by Lopez, Javier. Publication: . XIV, 357 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneus Security by Garcia-Alfaro, Joaquin. Publication: . XV, 319 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fundamental Approaches to Software Engineering by Lara, Juan. Publication: . Approx. 535 p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Regnell, Björn. Publication: . XV, 322p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Degano, Pierpaolo. Publication: . XIV, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Taft, Nina. Publication: . XI, 264 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Traffic Monitoring and Analysis by Pescapè, Antonio. Publication: . X, 175 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart