|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Smith, Adam.
Publication:
. XI, 219 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2012
by Safavi-Naini, Reihaneh.
Publication:
. XV, 888 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2011
by Kim, Howon.
Publication:
. XII, 512 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Verification of Object-Oriented Software
by Beckert, Bernhard.
Publication:
. X, 251 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 319p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Networks
by Li, Xiang-Yang.
Publication:
. XIV, 486p. 214 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVI
by Cuppens-Boulahia, Nora.
Publication:
. X, 340 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modelling Foundations and Applications
by Vallecillo, Antonio.
Publication:
. XIII, 446p. 188 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Susilo, Willy.
Publication:
. XIV, 460p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - AFRICACRYPT 2012
by Mitrokotsa, Aikaterini.
Publication:
. XI, 424p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Bao, Feng.
Publication:
. XIV, 580p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Dieste, Oscar.
Publication:
. XVI, 378p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Methods for Model-Driven Engineering
by Bernardo, Marco.
Publication:
. VII, 439 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
by Askoxylakis, Ioannis.
Publication:
. XII, 225p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Katzenbeisser, Stefan.
Publication:
. XII, 341p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2012
by Helleseth, Tor.
Publication:
. XII, 339 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 207p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Telecommunication Economics
by Hadjiantonis, Antonis M.
Publication:
. IX, 243 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|