|
|
Rainbow Connections of Graphs
by Li, Xueliang.
Publication:
. VIII, 103p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Crittografia nel Paese delle Meraviglie
by Venturi, Daniele.
Publication:
. XIV, 500 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Game Start!
by Alinovi, Francesco.
Publication:
. VII, 296 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Flow Based Security Control Beyond RBAC
by Fischer-Hellmann, Klaus-Peter.
Publication:
. XXI, 161 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Analytics
by Runkler, Thomas A.
Publication:
. X, 137 p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physically Unclonable Functions
by Maes, Roel.
Publication:
. XVII, 193 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modern Cryptography Primer
by Kościelny, Czesław.
Publication:
. XIV, 238 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Public Key Infrastructures
by Buchmann, Johannes A.
Publication:
. XV, 194 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Information Security and Privacy
by Böhme, Rainer.
Publication:
. XIII, 321 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Process Management Workshops
by Rosa, Marcello.
Publication:
. LVI, 783 p. 264 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 536 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding High-Dimensional Spaces
by Skillicorn, David B.
Publication:
. IX, 108 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Cryptography with Maple
by Gómez Pardo, José Luis.
Publication:
. XXX, 705 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Two-Party Computation Protocols
by Schneider, Thomas.
Publication:
. XVI, 138 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fault Analysis in Cryptography
by Joye, Marc.
Publication:
. XVI, 354 p. 98 illus., 35 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software and Data Technologies
by Cordeiro, José.
Publication:
. XII, 269 p. 99 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Linked Data in Linguistics
by Chiarcos, Christian.
Publication:
. XIV, 216p. 34 illus., 5 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Geometric Structure of High-Dimensional Data and Dimensionality Reduction
by Wang, Jianzhong.
Publication:
. Approx. 365 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
e-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 448 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|