|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Gao, Hong.
Publication:
. XV, 486p. 227 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2012
by Safavi-Naini, Reihaneh.
Publication:
. XV, 888 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2011
by Kim, Howon.
Publication:
. XII, 512 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing - ICSOC 2011 Workshops
by Pallis, George.
Publication:
. XII, 334 p. 106 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Algorithms, Systems, and Applications
by Wang, Xinbing.
Publication:
. XII, 680 p. 295 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bisociative Knowledge Discovery
by Berthold, Michael R.
Publication:
. IX, 485 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agents and Peer-to-Peer Computing
by Beneventano, Domenico.
Publication:
. XIV, 153p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Methodologies and Technologies for Networked Enterprises
by Anastasi, Giuseppe.
Publication:
. XX, 453 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 319p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Networks
by Li, Xiang-Yang.
Publication:
. XIV, 486p. 214 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages, and Programming
by Czumaj, Artur.
Publication:
. 860p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages, and Programming
by Czumaj, Artur.
Publication:
. 700p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVI
by Cuppens-Boulahia, Nora.
Publication:
. X, 340 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parallel Processing and Applied Mathematics
by Wyrzykowski, Roman.
Publication:
. XXVII, 663 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parallel Processing and Applied Mathematics
by Wyrzykowski, Roman.
Publication:
. XXVII, 765 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - AFRICACRYPT 2012
by Mitrokotsa, Aikaterini.
Publication:
. XI, 424p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomous and Intelligent Systems
by Kamel, Mohamed.
Publication:
. VIII, 270 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Bao, Feng.
Publication:
. XIV, 580p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Ailamaki, Anastasia.
Publication:
. XVII, 654p. 318 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|