|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Smith, Adam.
Publication:
. XI, 219 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Gao, Hong.
Publication:
. XV, 486p. 227 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermarking
by Shi, Yun Qing.
Publication:
. X, 512 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2012
by Safavi-Naini, Reihaneh.
Publication:
. XV, 888 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security VIII
by Shi, Yun Q.
Publication:
. IX, 103 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2011
by Kim, Howon.
Publication:
. XII, 512 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Algorithms, Systems, and Applications
by Wang, Xinbing.
Publication:
. XII, 680 p. 295 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 319p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Computing Technology
by Huang, De-Shuang.
Publication:
. XXIV, 667 p. 257 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Computing Theories and Applications
by Huang, De-Shuang.
Publication:
. XXII, 683 p. 265 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVI
by Cuppens-Boulahia, Nora.
Publication:
. X, 340 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Susilo, Willy.
Publication:
. XIV, 460p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - AFRICACRYPT 2012
by Mitrokotsa, Aikaterini.
Publication:
. XI, 424p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Bao, Feng.
Publication:
. XIV, 580p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing
by Kay, Judy.
Publication:
. Approx. 495 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2012
by Murgante, Beniamino.
Publication:
. XXII, 765p. 260 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2012
by Murgante, Beniamino.
Publication:
. XXI, 661p. 251 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2012
by Murgante, Beniamino.
Publication:
. XXXIX, 759p. 317 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2012
by Murgante, Beniamino.
Publication:
. XXI, 759 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|