|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Chim, Tat Wing.
Publication:
. XVI, 506 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Hanaoka, Goichiro.
Publication:
. XII, 261 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Canteaut, Anne.
Publication:
. XII, 463 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Network Security
by Kotenko, Igor.
Publication:
. XIV, 319 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy in Statistical Databases
by Domingo-Ferrer, Josep.
Publication:
. XII, 365 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – LATINCRYPT 2012
by Hevia, Alejandro.
Publication:
. XII, 323 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Visconti, Ivan.
Publication:
. XI, 582 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 177 p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. VIII, 239 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identity
by Kiayias, Aggelos.
Publication:
. X, 257 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2012
by Safavi-Naini, Reihaneh.
Publication:
. XV, 888 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2011
by Kim, Howon.
Publication:
. XII, 512 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 319p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Arithmetic of Finite Fields
by Özbudak, Ferruh.
Publication:
. XII, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVI
by Cuppens-Boulahia, Nora.
Publication:
. X, 340 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - AFRICACRYPT 2012
by Mitrokotsa, Aikaterini.
Publication:
. XI, 424p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|