|
|
Financial Cryptography and Data Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 406 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Aided Verification
by Sharygina, Natasha.
Publication:
. XXII, 1015 p. 237 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Wang, G. Alan.
Publication:
. X, 117 p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2013
by Murgante, Beniamino.
Publication:
. XXXVI, 679 p. 276 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2013
by Murgante, Beniamino.
Publication:
. XXXVI, 729 p. 317 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Interactive Theorem Proving
by Blazy, Sandrine.
Publication:
. XII, 498 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Computing Theories and Technology
by Huang, De-Shuang.
Publication:
. XXIV, 693 p. 268 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Computing Theories
by Huang, De-Shuang.
Publication:
. XXII, 651 p. 256 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Aspects of Information Security, Privacy, and Trust
by Marinos, Louis.
Publication:
. XX, 378 p. 102 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVII
by Wang, Lingyu.
Publication:
. XIV, 305 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Cristofaro, Emiliano.
Publication:
. X, 265 p. 88 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Emerging Management Mechanisms for the Future Internet
by Doyen, Guillaume.
Publication:
. XVI, 161 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Gaborit, Philippe.
Publication:
. X, 259 p. 17 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Wang, Jianyong.
Publication:
. XXVIII, 812 p. 326 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2013
by Youssef, Amr.
Publication:
. XIV, 453 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|