|
|
Advances in Cryptology - ASIACRYPT 2010
by Abe, Masayuki.
Publication:
. XIV, 634p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Alpcan, Tansu.
Publication:
. X, 281p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems, OTM 2010
by Meersman, Robert.
Publication:
. XXII, 466p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems: OTM 2010
by Meersman, Robert.
Publication:
. XXII, 703p. 230 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Echizen, Isao.
Publication:
. XIII, 371p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification: Security and Privacy Issues
by Ors Yalcin, Siddika Berna.
Publication:
. X, 271p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XV, 514p. 257 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XV, 472p. 269 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XXVII, 534p. 217 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Intelligence and Computational Intelligence
by Wang, Fu Lee.
Publication:
. XXI, 498p. 203 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Intelligence and Computational Intelligence
by Wang, Fu Lee.
Publication:
. XXII, 386p. 149 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Martinelli, Fabio.
Publication:
. X, 303p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Hiding
by Böhme, Rainer.
Publication:
. X, 277p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ubiquitous Knowledge Discovery
by May, Michael.
Publication:
. X, 255p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Bao, Feng.
Publication:
. XIII, 460p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Heng, Swee-Huay.
Publication:
. X, 279p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops
by Dan, Asit.
Publication:
. XXXIV, 584p. 177 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Stabilization, Safety, and Security of Distributed Systems
by Dolev, Shlomi.
Publication:
. XVI, 614p. 150 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Schoitsch, Erwin.
Publication:
. X, 482p. 197 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthly Global Computing
by Wirsing, Martin.
Publication:
. XII, 380p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|