|
|
Security and Trust Management
by Meadows, Catherine.
Publication:
. X, 239p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Schindler, Werner.
Publication:
. Approx. 280 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. XII, 185 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Services and Formal Methods
by Carbone, Marco.
Publication:
. IX, 143 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Petkova-Nikova, Svetla.
Publication:
. X, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
by Snoeyink, Jack.
Publication:
. XVII, 370 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communication Technologies for Vehicles
by Vinel, Alexey.
Publication:
. XII, 188 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Models in Software Engineering
by Kienzle, Jörg.
Publication:
. X, 292 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Technology for Applications
by Laud, Peeter.
Publication:
. X, 273 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Security and Trust
by Barthe, Gilles.
Publication:
. X, 279 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Ryan, Mark D.
Publication:
. XIII, 406p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Computing, Behavioral - Cultural Modeling and Prediction
by Yang, Shanchieh Jay.
Publication:
. XIV, 366p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2012
by Pointcheval, David.
Publication:
. XIV, 758 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection
by Lopez, Javier.
Publication:
. XIV, 357 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneus Security
by Garcia-Alfaro, Joaquin.
Publication:
. XV, 319 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fundamental Approaches to Software Engineering
by Lara, Juan.
Publication:
. Approx. 535 p. 168 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Regnell, Björn.
Publication:
. XV, 322p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Degano, Pierpaolo.
Publication:
. XIV, 431 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Passive and Active Measurement
by Taft, Nina.
Publication:
. XI, 264 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Traffic Monitoring and Analysis
by Pescapè, Antonio.
Publication:
. X, 175 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|