//]]>
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 406 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product-Focused Software Process Improvement by Heidrich, Jens. Publication: . XVI, 374 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design Science at the Intersection of Physical and Virtual Design by Brocke, Jan. Publication: . XVI, 528 p. 130 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Information Systems Engineering by Salinesi, Camille. Publication: . XXXVIII, 706 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems Engineering – WISE 2011 and 2012 Workshops by Haller, Armin. Publication: . XVI, 350 p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Health Information Science by Huang, Guangyan. Publication: . XIV, 280 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Wu, Chuan-Kun. Publication: . X, 394 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Serna, Maria. Publication: . X, 263 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business System Management and Engineering by Ardagna, Claudio A. Publication: . X, 197 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2011 Workshops by Pallis, George. Publication: . XII, 334 p. 106 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Susilo, Willy. Publication: . XIV, 460p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product-Focused Software Process Improvement by Dieste, Oscar. Publication: . XVI, 378p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Persiano, Giuseppe. Publication: . XI, 327p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Converged, Internet-Based Networks by Cohen, Johanne. Publication: . IX, 75p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>