//]]>
Security and Privacy Protection in Information Processing Systems by Janczewski, Lech J. Publication: . XIV, 436 p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust Management VII by Fernández-Gago, Carmen. Publication: . XII, 289 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quality, Reliability, Security and Robustness in Heterogeneous Networks by Singh, Karan. Publication: . XVIII, 1011 p. 488 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Policies and Research in Identity Management by Fischer-Hübner, Simone. Publication: . X, 161 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XII, 366 p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Keromytis, Angelos D. Publication: . X, 369 p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Network Security by Chen, Lei. Publication: . X, 274 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Computing and Services by Yuan, Yuyu. Publication: . XVIII, 739 p. 301 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Bio-technology, Multimedia, and Ubiquitous City by Kim, Tai-hoon. Publication: . XXII, 408 p. 239 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Security, Control and System Engineering by Kim, Tai-hoon. Publication: . XX, 488 p. 228 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information Technology by Papasratorn, Borworn. Publication: . VIII, 199 p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Computer Networks and Distributed Systems Security by Thampi, Sabu M. Publication: . XXI, 508 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics VIII by Peterson, Gilbert. Publication: . XVIII, 333 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Eco-friendly Computing and Communication Systems by Mathew, Jimson. Publication: . XIII, 444 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Rajarajan, Muttukrishnan. Publication: . XIV, 548 p. 174 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Camenisch, Jan. Publication: . XIII, 293p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy Research by Gritzalis, Dimitris. Publication: . XI, 578p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust Management VI by Dimitrakos, Theo. Publication: . XIV, 284p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Simplot-Ryl, David. Publication: . VIII, 239p. 123 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Technology by Kim, Tai-hoon. Publication: . Approx. 250 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart