|
|
Security and Cryptography for Networks
by Garay, Juan A.
Publication:
. VII, 474p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government and the Information Systems Perspective
by Andersen, Kim Normann.
Publication:
. XII, 265p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Katsikas, Sokratis.
Publication:
. XII, 252p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Architecture
by Babar, Muhammad Ali.
Publication:
. XII, 534p. 162 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sion, Radu.
Publication:
. X, 257p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Spaces and Next Generation Wired/Wireless Networking
by Balandin, Sergey.
Publication:
. XVI, 486p. 212 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Wimmer, Maria A.
Publication:
. XIV, 437p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-Hoc, Mobile and Wireless Networks
by Nikolaidis, Ioanis.
Publication:
. X, 222p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2010
by Rabin, Tal.
Publication:
. XIV, 744p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 263p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Kurosawa, Kaoru.
Publication:
. X, 249p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information, Security and Cryptology – ICISC 2009
by Lee, Donghoon.
Publication:
. XIII, 387p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Rome, Erich.
Publication:
. XII, 213p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Aspects in Information and Management
by Chen, Bo.
Publication:
. XI, 336p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Testing Techniques in Software Engineering
by Borba, Paulo.
Publication:
. IX, 313p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Kreibich, Christian.
Publication:
. XII, 219p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Wieringa, Roel.
Publication:
. XII, 280p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Steinfeld, Ron.
Publication:
. XII, 403p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Networked Services and Applications - Engineering, Control and Management
by Aagesen, Finn Arve.
Publication:
. XIII, 275p. 125 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Acquisti, Alessandro.
Publication:
. XIII, 441p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|