|
|
Critical Information Infrastructure Security
by Bologna, Sandro.
Publication:
. XII, 227 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Susilo, Willy.
Publication:
. X, 347 p. 36 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermaking
by Shi, Yun Q.
Publication:
. XX, 532 p. 245 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Prouff, Emmanuel.
Publication:
. X, 215 p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Capitani di Vimercati, Sabrina.
Publication:
. X, 195 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Cristofaro, Emiliano.
Publication:
. X, 265 p. 88 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Huth, Michael.
Publication:
. XIV, 278 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communication Technology
by Mustofa, Khabib.
Publication:
. XVI, 552 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XX
by Christianson, Bruce.
Publication:
. X, 277 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Mitchell, Chris J.
Publication:
. X, 117 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Network Security
by Kotenko, Igor.
Publication:
. XIV, 319 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Gollmann, Dieter.
Publication:
. XIV, 402 p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Takagi, Tsuyoshi.
Publication:
. XIII, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Keromytis, Angelos D.
Publication:
. XI, 416 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identity
by Kiayias, Aggelos.
Publication:
. X, 257 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Smith, Adam.
Publication:
. XI, 219 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|