|
|
Ubiquitous Intelligence and Computing
by Yu, Zhiwen.
Publication:
. XVII, 696p. 295 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Bao, Feng.
Publication:
. XIII, 460p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Game Theory
by Kontogiannis, Spyros.
Publication:
. VIII, 359p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
by Armando, Alessandro.
Publication:
. IX, 185p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cooperative Design, Visualization, and Engineering
by Luo, Yuhua.
Publication:
. XII, 302p. 125 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Haptic and Audio Interaction Design
by Nordahl, Rolf.
Publication:
. XII, 207p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Schoitsch, Erwin.
Publication:
. X, 482p. 197 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 172p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Jha, Somesh.
Publication:
. 524p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2010
by Gritzalis, Dimitris.
Publication:
. XIV, 718p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Garay, Juan A.
Publication:
. VII, 474p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government and the Information Systems Perspective
by Andersen, Kim Normann.
Publication:
. XII, 265p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Participation
by Tambouris, Efthimios.
Publication:
. X, 237p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Katsikas, Sokratis.
Publication:
. XII, 252p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sion, Radu.
Publication:
. X, 257p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Spaces and Next Generation Wired/Wireless Networking
by Balandin, Sergey.
Publication:
. XVI, 486p. 212 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Wimmer, Maria A.
Publication:
. XIV, 437p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2010
by Rabin, Tal.
Publication:
. XIV, 744p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Diagrammatic Representation and Inference
by Goel, Ashok K.
Publication:
. XIII, 356p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 263p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|