//]]>
Rainbow Connections of Graphs by Li, Xueliang. Publication: . VIII, 103p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Crittografia nel Paese delle Meraviglie by Venturi, Daniele. Publication: . XIV, 500 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Game Start! by Alinovi, Francesco. Publication: . VII, 296 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Flow Based Security Control Beyond RBAC by Fischer-Hellmann, Klaus-Peter. Publication: . XXI, 161 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Analytics by Runkler, Thomas A. Publication: . X, 137 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physically Unclonable Functions by Maes, Roel. Publication: . XVII, 193 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Information Security and Privacy by Böhme, Rainer. Publication: . XIII, 321 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management Workshops by Rosa, Marcello. Publication: . LVI, 783 p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Cryptography with Maple by Gómez Pardo, José Luis. Publication: . XXX, 705 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Two-Party Computation Protocols by Schneider, Thomas. Publication: . XVI, 138 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fault Analysis in Cryptography by Joye, Marc. Publication: . XVI, 354 p. 98 illus., 35 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software and Data Technologies by Cordeiro, José. Publication: . XII, 269 p. 99 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Linked Data in Linguistics by Chiarcos, Christian. Publication: . XIV, 216p. 34 illus., 5 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Geometric Structure of High-Dimensional Data and Dimensionality Reduction by Wang, Jianzhong. Publication: . Approx. 365 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
e-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 448 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart