//]]>
Multiple Access Communications by Sacchi, Claudio. Publication: . XIII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Sommer, Robin. Publication: . 398p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 170p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Warehousing and Knowledge Discovery by Cuzzocrea, Alfredo. Publication: . XIV, 498p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Calero, Jose M. Alcaraz. Publication: . XII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Availability, Reliability and Security for Business, Enterprise and Health Information Systems by Tjoa, A Min. Publication: . XIII, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Security Analysis and Design VI by Aldini, Alessandro. Publication: . VII, 275p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 Workshops by Casares-Giner, Vicente. Publication: . XVI, 290p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Furnell, Steven. Publication: . XII, 223 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Spaces and Next Generation Wired/Wireless Networking by Balandin, Sergey. Publication: . XVI, 634 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2011 by Rogaway, Phillip. Publication: . XV, 782p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation by Goldreich, Oded. Publication: . XI, 563p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Camenisch, Jan. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Cuellar, Jorge. Publication: . X, 271 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Holz, Thorsten. Publication: . X, 235p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXV by Li, Yingjiu. Publication: . XI, 309p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 285 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVI by Christianson, Bruce. Publication: . IX, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2011 by Nitaj, Abderrahmane. Publication: . XIII, 387p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart