//]]>
Topics in Cryptology - CT-RSA 2010 by Pieprzyk, Josef. Publication: . 397p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Massacci, Fabio. Publication: . X, 241 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Kant, Krishna. Publication: . XIX, 522p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Replication by Charron-Bost, Bernadette. Publication: . XV, 290p. 79 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyberspace Safety and Security by Wang, Guojun. Publication: . XXVI, 480 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2013 by Paul, Goutam. Publication: . XVIII, 319 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Bloem, Roderick. Publication: . XII, 103 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Abdalla, Michel. Publication: . XVIII, 349 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Qing, Sihan. Publication: . XIV, 414 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart