|
|
Information Technology Convergence, Secure and Trust Computing, and Data Management
by Park, Jong Hyuk (James).
Publication:
. XXXII, 296 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Chaos-Based Cryptography
by Kocarev, Ljupco.
Publication:
. X, 390p. 161 illus., 67 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Video and Audio Broadcasting Technology
by Fischer, Walter.
Publication:
. XXVII, 800p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Information and Communication Security
by Stavroulakis, Peter.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Computational Science, Engineering and Information Technology
by Nagamalai, Dhinaharan.
Publication:
. XX, 326 p. 135 illus., 13 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Speech Dereverberation
by Naylor, Patrick A.
Publication:
. XVIII, 388p. 126 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced DPA Theory and Practice
by Peeters, Eric.
Publication:
. XVI, 139 p. 70 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy-Preserving Machine Learning for Speech Processing
by Pathak, Manas A.
Publication:
. XVII, 141 p. 21 illus., 13 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Securing Wireless Communications at the Physical Layer
by Liu, Ruoheng.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing
by Afek, Yehuda.
Publication:
. XXIV, 586 p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cellular Automata and Discrete Complex Systems
by Kari, Jarkko.
Publication:
. X, 187 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Applications of Models of Computation
by Chan, T-H. Hubert.
Publication:
. XV, 356 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Jürjens, Jan.
Publication:
. XII, 231 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Pieprzyk, Josef.
Publication:
. XVI, 311 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Chim, Tat Wing.
Publication:
. XVI, 506 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy in Statistical Databases
by Domingo-Ferrer, Josep.
Publication:
. XII, 365 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2012
by Prouff, Emmanuel.
Publication:
. XVII, 562 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermarking
by Shi, Yun Qing.
Publication:
. X, 512 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|