|
|
Electronic Government
by Wimmer, Maria A.
Publication:
. XIV, 335 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVII
by Christianson, Bruce.
Publication:
. X, 367 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Scholl, Hans J.
Publication:
. XIII, 279 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 207p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Analysis of Social Media and Ubiquitous Data
by Atzmueller, Martin.
Publication:
. VIII, 163p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Janssen, Marijn.
Publication:
. XVI, 466 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVI
by Christianson, Bruce.
Publication:
. IX, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 133p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resistance, Liberation Technology and Human Rights in the Digital Age
by Ziccardi, Giovanni.
Publication:
. VIII, 328 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Second Generation Biometrics: The Ethical, Legal and Social Context
by Mordini, Emilio.
Publication:
. X, 353p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection VII
by Butts, Jonathan.
Publication:
. XVI, 227 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Source Software: Quality Verification
by Petrinja, Etiel.
Publication:
. XIV, 277 p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multimedia Communications, Services and Security
by Dziech, Andrzej.
Publication:
. XIV, 325 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection VI
by Butts, Jonathan.
Publication:
. XVI, 233 p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Auditing and GRC Automation in SAP
by Chuprunov, Maxim.
Publication:
. XXXII, 525 p. 273 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Security
by Aschenbruck, Nils.
Publication:
. Approx. 530 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Auctions, Market Mechanisms, and Their Applications
by Coles, Peter.
Publication:
. XII, 113 p. 16 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics VII
by Peterson, Gilbert.
Publication:
. XVIII, 290 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Forensics in Telecommunications, Information, and Multimedia
by Lai, Xuejia.
Publication:
. XIII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|