|
|
Information Security and Privacy
by Parampalli, Udaya.
Publication:
. XIII, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Cuellar, Jorge.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXV
by Li, Yingjiu.
Publication:
. XI, 309p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVI
by Christianson, Bruce.
Publication:
. IX, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 133p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent and Multi-Agent Systems: Technologies and Applications
by O’Shea, James.
Publication:
. XVII, 704p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2011
by Nitaj, Abderrahmane.
Publication:
. XIII, 387p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Interface and the Management of Information. Interacting with Information
by Smith, Michael J.
Publication:
. XXX, 673p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Joux, Antoine.
Publication:
. XI, 417p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Xenakis, Christos.
Publication:
. X, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by McCune, Jonathan M.
Publication:
. VII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wired/Wireless Internet Communications
by Masip-Bruin, Xavier.
Publication:
. XV, 506 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Classifier Systems
by Sansone, Carlo.
Publication:
. XII, 372p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Lopez, Javier.
Publication:
. XIII, 552 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Intelligence in Security for Information Systems
by Herrero, Álvaro.
Publication:
. XIV, 310p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
by Ardagna, Claudio A.
Publication:
. XIII, 392 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Bao, Feng.
Publication:
. XIII, 448p.
Availability:
Copies available:
AUM Main Library
(1),
|
|