|
|
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
by Samarati, Pierangela.
Publication:
. XIII, 386p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology - CT-RSA 2010
by Pieprzyk, Josef.
Publication:
. 397p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Networking
by Kant, Krishna.
Publication:
. XIX, 522p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyberspace Safety and Security
by Wang, Guojun.
Publication:
. XXVI, 480 p. 149 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2013
by Paul, Goutam.
Publication:
. XVIII, 319 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Bloem, Roderick.
Publication:
. XII, 103 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Abdalla, Michel.
Publication:
. XVIII, 349 p. 52 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Qing, Sihan.
Publication:
. XIV, 414 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Crittografia nel Paese delle Meraviglie
by Venturi, Daniele.
Publication:
. XIV, 500 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy Preserving in Social Networks
by Chbeir, Richard.
Publication:
. XVI, 367 p. 107 illus., 66 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics IX
by Peterson, Gilbert.
Publication:
. XX, 398 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust Management VII
by Fernández-Gago, Carmen.
Publication:
. XII, 289 p. 49 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quality, Reliability, Security and Robustness in Heterogeneous Networks
by Singh, Karan.
Publication:
. XVIII, 1011 p. 488 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Fischer-Hübner, Simone.
Publication:
. X, 161 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad Hoc Networks
by Zheng, Jun.
Publication:
. XII, 366 p. 168 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Keromytis, Angelos D.
Publication:
. X, 369 p. 111 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Computing and Services
by Yuan, Yuyu.
Publication:
. XVIII, 739 p. 301 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Computer Networks and Distributed Systems Security
by Thampi, Sabu M.
Publication:
. XXI, 508 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|