|
|
Advances in Information and Computer Security
by Echizen, Isao.
Publication:
. XIII, 371p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification: Security and Privacy Issues
by Ors Yalcin, Siddika Berna.
Publication:
. X, 271p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic and Trusted Computing
by Xie, Bing.
Publication:
. XVII, 328p. 112 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Martinelli, Fabio.
Publication:
. X, 303p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Bao, Feng.
Publication:
. XIII, 460p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Heng, Swee-Huay.
Publication:
. X, 279p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Technologies for Embedded and Ubiquitous Systems
by Min, Sang Lyul.
Publication:
. XI, 253p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model Driven Engineering Languages and Systems
by Petriu, Dorina C.
Publication:
. XXI, 424p. 173 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops
by Dan, Asit.
Publication:
. XXXIV, 584p. 177 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model Driven Engineering Languages and Systems
by Petriu, Dorina C.
Publication:
. XXI, 422p. 162 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Aspect-Oriented Software Development VII
by Katz, Shmuel.
Publication:
. XV, 423p. 234 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Stabilization, Safety, and Security of Distributed Systems
by Dolev, Shlomi.
Publication:
. XVI, 614p. 150 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Internet - FIS 2010
by Berre, Arne J.
Publication:
. XII, 157p. 45 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2010
by Carlet, Claude.
Publication:
. X, 465p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthly Global Computing
by Wirsing, Martin.
Publication:
. XII, 380p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Databases and Information Systems
by Catania, Barbara.
Publication:
. XV, 600p. 230 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 172p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2010
by Gritzalis, Dimitris.
Publication:
. XIV, 718p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Incentives, Overlays, and Economic Traffic Control
by Stiller, Burkhard.
Publication:
. X, 109p. 44 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Vinel, Alexey.
Publication:
. XIII, 287p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|