|
|
Social Informatics
by Aberer, Karl.
Publication:
. XIV, 560 p. 162 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Mitchell, Chris J.
Publication:
. X, 117 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyberspace Safety and Security
by Xiang, Yang.
Publication:
. XIV, 510 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Programming Languages and Systems
by Jhala, Ranjit.
Publication:
. XII, 389 p. 104 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Middleware 2012
by Narasimhan, Priya.
Publication:
. XVI, 498 p. 208 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Venkatakrishnan, Venkat.
Publication:
. XVI, 353 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2012
by Wang, Xiaoyun.
Publication:
. XVI, 780 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2012
by Galbraith, Steven.
Publication:
. XIV, 566 p. 118 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Distributed Computing Systems
by Xiang, Yang.
Publication:
. XIV, 289 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Knowledge Engineering
by Xiang, Yang.
Publication:
. XII, 251 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Decisions for Artificial Intelligence
by Torra, Vicenç.
Publication:
. XIV, 422 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Liu, Chengfei.
Publication:
. XX, 795 p. 258 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Grossklags, Jens.
Publication:
. XII, 309 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Cryptology
by Armknecht, Frederik.
Publication:
. X, 151 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Chim, Tat Wing.
Publication:
. XVI, 506 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|