|
|
Trust and Trustworthy Computing
by Acquisti, Alessandro.
Publication:
. XIII, 441p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Hong, Seokhie.
Publication:
. XI, 385p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Ali Babar, M.
Publication:
. XIII, 410p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXIV
by Foresti, Sara.
Publication:
. XIII, 376p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Zhou, Jianying.
Publication:
. XIII, 564p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIII, 281p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2010
by Gilbert, Henri.
Publication:
. XIV, 694p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2010
by Nguyen, Phong Q.
Publication:
. XIII, 519p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards Trustworthy Elections
by Chaum, David.
Publication:
. VIII, 403p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Sendrier, Nicolas.
Publication:
. X, 241p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security, Practice and Experience
by Kwak, Jin.
Publication:
. XIII, 399p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2010
by Bernstein, Daniel J.
Publication:
. XIII, 437p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ethics and Policy of Biometrics
by Kumar, Ajay.
Publication:
. VIII, 169p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Application
by Gollmann, Dieter.
Publication:
. X, 239p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects in Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 279p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
by Samarati, Pierangela.
Publication:
. XIII, 386p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Social Computing
by Chai, Sun-Ki.
Publication:
. XV, 426p. 126 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Das, Sajal K.
Publication:
. X, 265 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transforming Enterprise Cloud Services
by Chang, William Y.
Publication:
. XXV, 525p. 130 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|