//]]>
Cryptology and Network Security by Lin, Dongdai. Publication: . XII, 313 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Robotics by Mutlu, Bilge. Publication: . XV, 237p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Yang, Bo-Yin. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011 Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2011 by Lee, Dong Hoon. Publication: . XIV, 760 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming Languages and Systems by Yang, Hongseok. Publication: . XI, 372p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
RFID. Security and Privacy by Juels, Ari. Publication: . X, 260p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 362p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Baras, John S. Publication: . X, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Intelligent Information Systems by Bouvry, Pascal. Publication: . XVII, 401 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Qing, Sihan. Publication: . XIII, 432p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Iwata, Tetsu. Publication: . XII, 231 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2011 by Meersman, Robert. Publication: . XXVIII, 430 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Lai, Xuejia. Publication: . XIII, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Intelligent Computing by Huang, De-Shuang. Publication: . XXI, 707 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Informatics by Datta, Anwitaman. Publication: . XVII, 342 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Aspects in Information Technology by Joye, Marc. Publication: . XIV, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VI by Shi, Yun Q. Publication: . XI, 110p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Défago, Xavier. Publication: . XIV, 452 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dependable and Historic Computing by Jones, Cliff B. Publication: . XII, 523p. 137 illus., 60 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart