|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Luiijf, Eric.
Publication:
. XIV, 219 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyberspace Safety and Security
by Wang, Guojun.
Publication:
. XXVI, 480 p. 149 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2013
by Paul, Goutam.
Publication:
. XVIII, 319 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Bloem, Roderick.
Publication:
. XII, 103 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Stabilization, Safety, and Security of Distributed Systems
by Higashino, Teruo.
Publication:
. XXIV, 380 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Abdalla, Michel.
Publication:
. XVIII, 349 p. 52 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Das, Sajal K.
Publication:
. X, 265 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Qing, Sihan.
Publication:
. XIV, 414 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
I contenuti digitali
by Lucchi, Nicola.
Publication:
. XIII, 315 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Ubiquitous Computing
by Khalil, Ismail.
Publication:
. XIX, 267 p. 117 illus., 47 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Crittografia nel Paese delle Meraviglie
by Venturi, Daniele.
Publication:
. XIV, 500 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks
by Raghavan, S.V.
Publication:
. XVI, 348 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ISSE 2009 Securing Electronic Business Processes
by Pohlmann, Norbert.
Publication:
. XVI, 368p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Flow Based Security Control Beyond RBAC
by Fischer-Hellmann, Klaus-Peter.
Publication:
. XXI, 161 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy Preserving in Social Networks
by Chbeir, Richard.
Publication:
. XVI, 367 p. 107 illus., 66 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Counterterrorism and Open Source Intelligence
by Wiil, Uffe Kock.
Publication:
. XVIII, 458 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ISSE 2013 Securing Electronic Business Processes
by Reimer, Helmut.
Publication:
. XV, 282 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Internet Technologies
by Su, Jinshu.
Publication:
. XII, 277 p. 132 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection VII
by Butts, Jonathan.
Publication:
. XVI, 227 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|