|
|
Programming Languages and Systems
by Yang, Hongseok.
Publication:
. XI, 372p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
RFID. Security and Privacy
by Juels, Ari.
Publication:
. X, 260p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 362p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Baras, John S.
Publication:
. X, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Intelligent Information Systems
by Bouvry, Pascal.
Publication:
. XVII, 401 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Qing, Sihan.
Publication:
. XIII, 432p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Iwata, Tetsu.
Publication:
. XII, 231 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Lai, Xuejia.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Aspects in Information Technology
by Joye, Marc.
Publication:
. XIV, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security VI
by Shi, Yun Q.
Publication:
. XI, 110p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Stabilization, Safety, and Security of Distributed Systems
by Défago, Xavier.
Publication:
. XIV, 452 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Dependable and Historic Computing
by Jones, Cliff B.
Publication:
. XII, 523p. 137 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Boyen, Xavier.
Publication:
. XIII, 399 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Flammini, Francesco.
Publication:
. XI, 482p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2010
by Rhee, Kyung-Hyune.
Publication:
. XIII, 435p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2011
by Preneel, Bart.
Publication:
. XIV, 524 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic and Trusted Computing
by Calero, Jose M. Alcaraz.
Publication:
. XII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations of Security Analysis and Design VI
by Aldini, Alessandro.
Publication:
. VII, 275p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2011
by Rogaway, Phillip.
Publication:
. XV, 782p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|