|
|
Distributed Computing
by Afek, Yehuda.
Publication:
. XXIV, 586 p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding High-Dimensional Spaces
by Skillicorn, David B.
Publication:
. IX, 108 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Information Security
by Basin, David.
Publication:
. XIV, 202 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Programming for Engineers
by Bradley, Aaron R.
Publication:
. XIV, 238 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encyclopedia of Cryptography and Security
by van Tilborg, Henk C. A.
Publication:
. XL, 1435p. eReference. In 2 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Biometrics
by Jain, Anil K.
Publication:
. XVI, 312 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Learn Cocoa on the Mac
by Nutting, Jack.
Publication:
. 400 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|