|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Engineering Techniques
by Huzar, Zbigniew.
Publication:
. XI, 291 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXV
by Li, Yingjiu.
Publication:
. XI, 309p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVI
by Christianson, Bruce.
Publication:
. IX, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 133p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Aspect-Oriented Software Development VIII
by Katz, Shmuel.
Publication:
. XIII, 221 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2011
by Nitaj, Abderrahmane.
Publication:
. XIII, 387p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Caivano, Danilo.
Publication:
. XIII, 353p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Online Communities and Social Computing
by Ozok, A. Ant.
Publication:
. XX, 388p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Interface and the Management of Information. Interacting with Information
by Smith, Michael J.
Publication:
. XXX, 673p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ergonomics and Health Aspects of Work with Computers
by Robertson, Michelle M.
Publication:
. XIX, 246 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Joux, Antoine.
Publication:
. XI, 417p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Xenakis, Christos.
Publication:
. X, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Interface and the Management of Information. Interacting with Information
by Salvendy, Gavriel.
Publication:
. XXIX, 539 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by McCune, Jonathan M.
Publication:
. VII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Lopez, Javier.
Publication:
. XIII, 552 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
End-User Development
by Costabile, Maria Francesca.
Publication:
. XVI, 426p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modelling Foundations and Applications
by France, Robert B.
Publication:
. XIV, 396p.
Availability:
Copies available:
AUM Main Library
(1),
|
|