//]]>
Handbook of financial cryptography and security /   Publication: Boca Raton, FL : Chapman & Hall/CRC, 2011 . xxvi, 605 p. : 27 cm. Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced statistical steganalysis/ by Bohme, Rainer, Publication: Heidelberg : Springer-Verlag, 2010 . 285 p. Date:2010 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Steganography in digital media : , principles, algorithms, and applications / by Fridrich, Jessica. Publication: Cambridge : Cambridge University Press, 2010 . xxii, 437 p., [4] p. of plates : 26 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Engineering secure software and systems : , Second International Symposium, Essos 2010, Pisa, Italy, February 3-4, 2010, proceedings /   Publication: Berlin : Springer, 2010 . x, 240 p. : Date:2010 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Chaos-Based Cryptography by Kocarev, Ljupco. Publication: . X, 390p. 161 illus., 67 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Securing Wireless Communications at the Physical Layer by Liu, Ruoheng. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Bagchi, Aditya. Publication: . XVI, 404 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 542 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 546 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Number Theory and Cryptography by Fischlin, Marc. Publication: . XII, 281 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XXI by Christianson, Bruce. Publication: . X, 267 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Riis Nielson, Hanne. Publication: . XIV, 321 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructure Security by Bologna, Sandro. Publication: . XII, 227 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Sakiyama, Kazuo. Publication: . XII, 319 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification by Hutter, Michael. Publication: . XIV, 177 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Adams, Andrew A. Publication: . XII, 239 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Gierlichs, Benedikt. Publication: . XIV, 191 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Palamidessi, Catuscia. Publication: . X, 213 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>