|
|
Cyberspace Safety and Security
by Xiang, Yang.
Publication:
. XIV, 510 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Venkatakrishnan, Venkat.
Publication:
. XVI, 353 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Bellalta, Boris.
Publication:
. XII, 183 p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2012
by Wang, Xiaoyun.
Publication:
. XVI, 780 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2012
by Galbraith, Steven.
Publication:
. XIV, 566 p. 118 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Hanaoka, Goichiro.
Publication:
. XII, 261 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Canteaut, Anne.
Publication:
. XII, 463 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Takagi, Tsuyoshi.
Publication:
. XIII, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2012
by Foresti, Sara.
Publication:
. XVII, 896 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Keromytis, Angelos D.
Publication:
. XI, 416 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Visconti, Ivan.
Publication:
. XI, 582 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 177 p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. VIII, 239 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identity
by Kiayias, Aggelos.
Publication:
. X, 257 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multidisciplinary Research and Practice for Information Systems
by Quirchmayr, Gerald.
Publication:
. XV, 683 p. 235 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|