//]]>
Trust and Trustworthy Computing by Huth, Michael. Publication: . XIV, 278 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Model Transformations by Duddy, Keith. Publication: . XIV, 221 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Fellows, Michael. Publication: . XII, 364 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Pattern Languages of Programming III by Noble, James. Publication: . X, 195 p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Gaborit, Philippe. Publication: . X, 259 p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Models. Change Management by Gerth, Christian. Publication: . XVI, 218 p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Services and Formal Methods by Beek, Maurice H. Publication: . X, 151 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Galis, Alex. Publication: . XLIV, 369 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Deng, Robert H. Publication: . XIV, 388 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Grid Security by Cuellar, Jorge. Publication: . VIII, 151 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Jøsang, Audun. Publication: . X, 321 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology – ICISC 2012 by Kwon, Taekyoung. Publication: . XIV, 512 p. 108 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Doerr, Joerg. Publication: . XVIII, 402 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral-Cultural Modeling and Prediction by Greenberg, Ariel M. Publication: . XVI, 535 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart