|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Information Systems and Mining
by Wang, Fu Lee.
Publication:
. XVIII, 718 p. 271 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Attacks, Intrusions, and Defenses
by Balzarotti, Davide.
Publication:
. XIV, 400 p. 119 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2012
by Foresti, Sara.
Publication:
. XVII, 896 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. VIII, 239 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multidisciplinary Research and Practice for Information Systems
by Quirchmayr, Gerald.
Publication:
. XV, 683 p. 235 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business System Management and Engineering
by Ardagna, Claudio A.
Publication:
. X, 197 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Smith, Adam.
Publication:
. XI, 219 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Susilo, Willy.
Publication:
. XIV, 460p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. XII, 185 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Technology for Applications
by Aura, Tuomas.
Publication:
. X, 289 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Interface and the Management of Information. Interacting with Information
by Smith, Michael J.
Publication:
. XXX, 673p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sion, Radu.
Publication:
. X, 257p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Internet Technologies
by Su, Jinshu.
Publication:
. XII, 277 p. 132 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modern Cryptography Primer
by Kościelny, Czesław.
Publication:
. XIV, 238 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Public Key Infrastructures
by Buchmann, Johannes A.
Publication:
. XV, 194 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Computing and Communications
by Thampi, Sabu M.
Publication:
. XVI, 404 p. 149 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Rogers, Marcus.
Publication:
. XIV, 329 p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Gladyshev, Pavel.
Publication:
. XII, 297 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Global Security, Safety and Sustainability & e-Democracy
by Georgiadis, Christos K.
Publication:
. XIV, 290 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|