|
|
Data Privacy Management and Autonomous Spontaneus Security
by Garcia-Alfaro, Joaquin.
Publication:
. XV, 319 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fundamental Approaches to Software Engineering
by Lara, Juan.
Publication:
. Approx. 535 p. 168 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Regnell, Björn.
Publication:
. XV, 322p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Degano, Pierpaolo.
Publication:
. XIV, 431 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Passive and Active Measurement
by Taft, Nina.
Publication:
. XI, 264 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Traffic Monitoring and Analysis
by Pescapè, Antonio.
Publication:
. X, 175 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Medical Content-Based Retrieval for Clinical Decision Support
by Müller, Henning.
Publication:
. X, 153 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Security: From Theory to Applications
by Naccache, David.
Publication:
. XIII, 502 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Internet Technology
by Ramanujam, R.
Publication:
. XI, 277p. 111 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Current Trends in Web Engineering
by Harth, Andreas.
Publication:
. XXXII, 361p. 119 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIII, 253 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Jung, Souhwan.
Publication:
. XII, 271p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Problems in Network Security
by Camenisch, Jan.
Publication:
. VIII, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. Approx. 335 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Prouff, Emmanuel.
Publication:
. XI, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematical and Engineering Methods in Computer Science
by Kotásek, Zdeněk.
Publication:
. XII, 215p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XIX
by Christianson, Bruce.
Publication:
. IX, 383 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Middleware 2011
by Kon, Fabio.
Publication:
. XIII, 514 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2011
by Bernstein, Daniel J.
Publication:
. XIII, 401 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Jajodia, Sushil.
Publication:
. XV, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|