//]]>
What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience by Berleur, Jacques. Publication: . XVI, 398 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Government, E-Services and Global Processes by Janssen, Marijn. Publication: . XV, 263p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy – Silver Linings in the Cloud by Rannenberg, Kai. Publication: . XVII, 312 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Network Security and Applications by Meghanathan, Natarajan. Publication: . 651p. 286 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Statistical Steganalysis by Böhme, Rainer. Publication: . XVI, 288 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Bezzi, Michele. Publication: . XI, 316p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Personal Satellite Services by Sithamparanathan, Kandeepan. Publication: . XIV, 452p. 257 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust Management IV by Nishigaki, Masakatsu. Publication: . XII, 277p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Assurance by Bandyopadhyay, Samir Kumar. Publication: . 350p. 151 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems, Technology and Management by Prasad, Sushil K. Publication: . XVI, 418p. 165 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantum Communication and Quantum Networking by Sergienko, Alexander. Publication: . XII, 312 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Digital Forensics by Weerasinghe, Dasun. Publication: . 196p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Emerging Wireless Communication and Networking Systems by Gu, Qijun. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Zia, Tanveer. Publication: . XII, 420 p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and the Networked Society by Gregory, Mark A. Publication: . XVI, 297 p. 62 illus., 59 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automated Security Management by Al-Shaer, Ehab. Publication: . VIII, 187 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVII, 335p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Data Compression by Salomon, David. Publication: . XXII, 1361p. 510 illus., 6 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Assessment in Vehicular Networks by Du, Suguo. Publication: . XI, 49 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart