//]]>
Multiple Access Communications by Sacchi, Claudio. Publication: . XIII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy Preserving in Social Networks by Chbeir, Richard. Publication: . XVI, 367 p. 107 illus., 66 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy Protection in Information Processing Systems by Janczewski, Lech J. Publication: . XIV, 436 p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Keromytis, Angelos D. Publication: . X, 369 p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Bio-technology, Multimedia, and Ubiquitous City by Kim, Tai-hoon. Publication: . XXII, 408 p. 239 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Security, Control and System Engineering by Kim, Tai-hoon. Publication: . XX, 488 p. 228 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information Technology by Papasratorn, Borworn. Publication: . VIII, 199 p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Rajarajan, Muttukrishnan. Publication: . XIV, 548 p. 174 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Camenisch, Jan. Publication: . XIII, 293p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy Research by Gritzalis, Dimitris. Publication: . XI, 578p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust Management VI by Dimitrakos, Theo. Publication: . XIV, 284p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Technology by Kim, Tai-hoon. Publication: . Approx. 250 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection V by Butts, Jonathan. Publication: . XIV, 218 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Zia, Tanveer. Publication: . XII, 420 p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and the Networked Society by Gregory, Mark A. Publication: . XVI, 297 p. 62 illus., 59 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVII, 335p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVIII, 372 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Cloud Computing by Hill, Richard. Publication: . XXI, 278 p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart