//]]>
Trust, Privacy and Security in Digital Business by Fischer-Hübner, Simone. Publication: . XI, 242 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Gao, Hong. Publication: . XV, 486p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Watermarking by Shi, Yun Qing. Publication: . X, 512 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2012 by Safavi-Naini, Reihaneh. Publication: . XV, 888 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VIII by Shi, Yun Q. Publication: . IX, 103 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2011 by Kim, Howon. Publication: . XII, 512 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Algorithms, Systems, and Applications by Wang, Xinbing. Publication: . XII, 680 p. 295 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 319p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Computing Technology by Huang, De-Shuang. Publication: . XXIV, 667 p. 257 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Computing Theories and Applications by Huang, De-Shuang. Publication: . XXII, 683 p. 265 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVI by Cuppens-Boulahia, Nora. Publication: . X, 340 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Susilo, Willy. Publication: . XIV, 460p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - AFRICACRYPT 2012 by Mitrokotsa, Aikaterini. Publication: . XI, 424p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Bao, Feng. Publication: . XIV, 580p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pervasive Computing by Kay, Judy. Publication: . Approx. 495 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2012 by Murgante, Beniamino. Publication: . XXII, 765p. 260 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2012 by Murgante, Beniamino. Publication: . XXI, 661p. 251 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2012 by Murgante, Beniamino. Publication: . XXXIX, 759p. 317 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2012 by Murgante, Beniamino. Publication: . XXI, 759 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search