|
|
Model and Data Engineering
by Cuzzocrea, Alfredo.
Publication:
. XII, 291 p. 109 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Measurement Methodology and Tools
by Fàbrega, Lluís.
Publication:
. VIII, 205 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Gierlichs, Benedikt.
Publication:
. XIV, 191 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Palamidessi, Catuscia.
Publication:
. X, 213 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Accorsi, Rafael.
Publication:
. X, 235 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 249 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Databases and Information Systems
by Catania, Barbara.
Publication:
. XIV, 402 p. 137 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented and Cloud Computing
by Lau, Kung-Kiu.
Publication:
. X, 244 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Communication Networking
by Bauschert, Thomas.
Publication:
. XII, 322 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet of Things, Smart Spaces, and Next Generation Networking
by Balandin, Sergey.
Publication:
. XIV, 440 p. 203 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Technology-Enabled Innovation for Democracy, Government and Governance
by Kő, Andrea.
Publication:
. XII, 255 p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Prouff, Emmanuel.
Publication:
. X, 215 p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Capitani di Vimercati, Sabrina.
Publication:
. X, 195 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction. Users and Contexts of Use
by Kurosu, Masaaki.
Publication:
. XXII, 514 p. 171 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Heidrich, Jens.
Publication:
. XVI, 374 p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVII
by Wang, Lingyu.
Publication:
. XIV, 305 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Network
by Cichoń, Jacek.
Publication:
. XIV, 329 p. 150 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Cristofaro, Emiliano.
Publication:
. X, 265 p. 88 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|