|
|
Information Systems Security
by Jha, Somesh.
Publication:
. XIV, 261p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Soriano, Miguel.
Publication:
. XIV, 474p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science X
by Gavrilova, Marina L.
Publication:
. XVIII, 366p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography - Pairing 2010
by Joye, Marc.
Publication:
. XIII, 467p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2010
by Gong, Guang.
Publication:
. XVI, 366p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology - ASIACRYPT 2010
by Abe, Masayuki.
Publication:
. XIV, 634p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Alpcan, Tansu.
Publication:
. X, 281p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Echizen, Isao.
Publication:
. XIII, 371p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification: Security and Privacy Issues
by Ors Yalcin, Siddika Berna.
Publication:
. X, 271p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic and Trusted Computing
by Xie, Bing.
Publication:
. XVII, 328p. 112 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Martinelli, Fabio.
Publication:
. X, 303p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Hiding
by Böhme, Rainer.
Publication:
. X, 277p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Bao, Feng.
Publication:
. XIII, 460p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Heng, Swee-Huay.
Publication:
. X, 279p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy in Statistical Databases
by Domingo-Ferrer, Josep.
Publication:
. XI, 297p. 47 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthly Global Computing
by Wirsing, Martin.
Publication:
. XII, 380p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 172p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2010
by Gritzalis, Dimitris.
Publication:
. XIV, 718p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Garay, Juan A.
Publication:
. VII, 474p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Katsikas, Sokratis.
Publication:
. XII, 252p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|