//]]>
Recent Advances in Intrusion Detection by Jha, Somesh. Publication: . 524p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Garay, Juan A. Publication: . VII, 474p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2010 - Parallel Processing by D’Ambra, Pasqua. Publication: . XXV, 544p. 222 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2010 - Parallel Processing by D’Ambra, Pasqua. Publication: . XXX, 600 p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government and the Information Systems Perspective by Andersen, Kim Normann. Publication: . XII, 265p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Participation by Tambouris, Efthimios. Publication: . X, 237p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Katsikas, Sokratis. Publication: . XII, 252p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Spaces and Next Generation Wired/Wireless Networking by Balandin, Sergey. Publication: . XVI, 486p. 212 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Wimmer, Maria A. Publication: . XIV, 437p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Learning by Tsang, Philip. Publication: . XV, 534p. 147 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2010 by Rabin, Tal. Publication: . XIV, 744p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Diagrammatic Representation and Inference by Goel, Ashok K. Publication: . XIII, 356p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 263p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Entertainment for Education. Digital Techniques and Systems by Zhang, Xiaopeng. Publication: . XVI, 635p. 310 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Atallah, Mikhail J. Publication: . X, 291p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Edutainment IV by Pan, Zhigeng. Publication: . X, 277p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Rome, Erich. Publication: . XII, 213p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart