|
|
Smart Card Research and Advanced Applications
by Prouff, Emmanuel.
Publication:
. XI, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
RFID. Security and Privacy
by Juels, Ari.
Publication:
. X, 260p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Lai, Xuejia.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Sacchi, Claudio.
Publication:
. XIII, 255 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic and Trusted Computing
by Calero, Jose M. Alcaraz.
Publication:
. XII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011 Workshops
by Casares-Giner, Vicente.
Publication:
. XVI, 290p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Xenakis, Christos.
Publication:
. X, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011
by Domingo-Pascual, Jordi.
Publication:
. XXII, 381 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011
by Domingo-Pascual, Jordi.
Publication:
. XXI, 473 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Erlingsson, Úlfar.
Publication:
. XI, 273p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Burmester, Mike.
Publication:
. XIV, 446p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science X
by Gavrilova, Marina L.
Publication:
. XVIII, 366p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification: Security and Privacy Issues
by Ors Yalcin, Siddika Berna.
Publication:
. X, 271p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic and Trusted Computing
by Xie, Bing.
Publication:
. XVII, 328p. 112 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
by Armando, Alessandro.
Publication:
. IX, 185p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthly Global Computing
by Wirsing, Martin.
Publication:
. XII, 380p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Vinel, Alexey.
Publication:
. XIII, 287p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Rome, Erich.
Publication:
. XII, 213p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecting Critical Systems
by Giese, Holger.
Publication:
. 205p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2010
by Crovella, Mark.
Publication:
. XVI, 410p. 181 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|