//]]>
Social Informatics by Aberer, Karl. Publication: . XIV, 560 p. 162 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Mitchell, Chris J. Publication: . X, 117 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyberspace Safety and Security by Xiang, Yang. Publication: . XIV, 510 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming Languages and Systems by Jhala, Ranjit. Publication: . XII, 389 p. 104 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware 2012 by Narasimhan, Priya. Publication: . XVI, 498 p. 208 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Venkatakrishnan, Venkat. Publication: . XVI, 353 p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2012 by Wang, Xiaoyun. Publication: . XVI, 780 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2012 by Galbraith, Steven. Publication: . XIV, 566 p. 118 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Xiang, Yang. Publication: . XIV, 289 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Wu, Chuan-Kun. Publication: . X, 394 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Knowledge Engineering by Xiang, Yang. Publication: . XII, 251 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Blyth, Jim. Publication: . X, 141 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Decisions for Artificial Intelligence by Torra, Vicenç. Publication: . XIV, 422 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Xu, Li. Publication: . XIV, 532 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Bogdanov, Andrey. Publication: . XII, 173 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Liu, Chengfei. Publication: . XX, 795 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Grossklags, Jens. Publication: . XII, 309 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Jøsang, Audun. Publication: . X, 247 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Cryptology by Armknecht, Frederik. Publication: . X, 151 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Chim, Tat Wing. Publication: . XVI, 506 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart