//]]>
Engineering secure software and systems : , Second International Symposium, Essos 2010, Pisa, Italy, February 3-4, 2010, proceedings /   Publication: Berlin : Springer, 2010 . x, 240 p. : Date:2010 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Bagchi, Aditya. Publication: . XVI, 404 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 542 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 546 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Number Theory and Cryptography by Fischlin, Marc. Publication: . XII, 281 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XXI by Christianson, Bruce. Publication: . X, 267 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Riis Nielson, Hanne. Publication: . XIV, 321 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructure Security by Bologna, Sandro. Publication: . XII, 227 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Sakiyama, Kazuo. Publication: . XII, 319 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification by Hutter, Michael. Publication: . XIV, 177 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Adams, Andrew A. Publication: . XII, 239 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Gierlichs, Benedikt. Publication: . XIV, 191 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Palamidessi, Catuscia. Publication: . X, 213 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Accorsi, Rafael. Publication: . X, 235 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 249 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Engineering and Intelligence Informatics by Cuzzocrea, Alfredo. Publication: . XIV, 466 p. 122 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Availability, Reliability, and Security in Information Systems and HCI by Cuzzocrea, Alfredo. Publication: . XVI, 504 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Lightweight Cryptography for Security and Privacy by Avoine, Gildas. Publication: . X, 143 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>