|
|
Engineering Secure Software and Systems
by Massacci, Fabio.
Publication:
. X, 241 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Fischer-Hübner, Simone.
Publication:
. X, 161 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Computing and Services
by Yuan, Yuyu.
Publication:
. XVIII, 739 p. 301 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information Technology
by Papasratorn, Borworn.
Publication:
. VIII, 199 p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Network Security and Applications
by Wyld, David C.
Publication:
. XVIII, 660 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure and Trust Computing, Data Management and Applications
by Park, James J.
Publication:
. XV, 252 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communication and Networking
by Kim, Tai-hoon.
Publication:
. XII, 250p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information Technology
by Papasratorn, Borworn.
Publication:
. VIII, 215p. 88 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Jajodia, Sushil.
Publication:
. XIII, 500p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Collaborative Networks for a Sustainable World
by Camarinha-Matos, Luis M.
Publication:
. XX, 783p. 215 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Network Security and Applications
by Meghanathan, Natarajan.
Publication:
. 651p. 286 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems, Technology and Management
by Prasad, Sushil K.
Publication:
. XVI, 418p. 165 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantum Communication and Quantum Networking
by Sergienko, Alexander.
Publication:
. XII, 312 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Source Software for Digital Forensics
by Huebner, Ewa.
Publication:
. VII, 117p. 40 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Security
by Huang, Scott C.-H.
Publication:
. XXIII, 300p. 116 illus., 58 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|