|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Aspects in Information Technology
by Joye, Marc.
Publication:
. XIV, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security VI
by Shi, Yun Q.
Publication:
. XI, 110p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Boyen, Xavier.
Publication:
. XIII, 399 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2011
by Atluri, Vijay.
Publication:
. XIV, 686p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Sommer, Robin.
Publication:
. 398p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 170p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Warehousing and Knowledge Discovery
by Cuzzocrea, Alfredo.
Publication:
. XIV, 498p. 180 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability and Security for Business, Enterprise and Health Information Systems
by Tjoa, A Min.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Furnell, Steven.
Publication:
. XII, 223 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2011
by Rogaway, Phillip.
Publication:
. XV, 782p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Cuellar, Jorge.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by McCune, Jonathan M.
Publication:
. VII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
by Ardagna, Claudio A.
Publication:
. XIII, 392 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Bao, Feng.
Publication:
. XIII, 448p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Fehr, Serge.
Publication:
. X, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|