|
|
Progress in Cryptology - INDOCRYPT 2012
by Galbraith, Steven.
Publication:
. XIV, 566 p. 118 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Distributed Computing Systems
by Xiang, Yang.
Publication:
. XIV, 289 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Knowledge Engineering
by Xiang, Yang.
Publication:
. XII, 251 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Decisions for Artificial Intelligence
by Torra, Vicenç.
Publication:
. XIV, 422 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Liu, Chengfei.
Publication:
. XX, 795 p. 258 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Grossklags, Jens.
Publication:
. XII, 309 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Cryptology
by Armknecht, Frederik.
Publication:
. X, 151 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Chim, Tat Wing.
Publication:
. XVI, 506 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Hanaoka, Goichiro.
Publication:
. XII, 261 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Canteaut, Anne.
Publication:
. XII, 463 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change
by Margaria, Tiziana.
Publication:
. XVI, 617 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Conceptual Modeling
by Castano, Silvana.
Publication:
. XX, 406 p. 130 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Network Security
by Kotenko, Igor.
Publication:
. XIV, 319 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling and Mining Ubiquitous Social Media
by Atzmueller, Martin.
Publication:
. XII, 183 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Ortmeier, Frank.
Publication:
. XVIII, 402 p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|