|
|
Pervasive Computing and the Networked World
by Zu, Qiaohong.
Publication:
. XXII, 921 p. 434 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Basin, David.
Publication:
. XX, 287 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communication Technology
by Mustofa, Khabib.
Publication:
. XVI, 552 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Jürjens, Jan.
Publication:
. XII, 231 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Passive and Active Measurement
by Roughan, Matthew.
Publication:
. XII, 282 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVII
by Christianson, Bruce.
Publication:
. X, 367 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2013
by Dawson, Ed.
Publication:
. XIV, 405 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Internet Technology
by Hota, Chittaranjan.
Publication:
. XIV, 574 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Areas in Cryptography
by Knudsen, Lars R.
Publication:
. XIV, 407 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Pietro, Roberto.
Publication:
. XIV, 333 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XVII
by Gavrilova, Marina L.
Publication:
. XII, 199 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XX
by Christianson, Bruce.
Publication:
. X, 277 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Networking
by Frey, Davide.
Publication:
. XX, 466 p. 121 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and Parallel Computing
by Park, James J.
Publication:
. XX, 647 p. 253 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Lee, Dong Hoon.
Publication:
. XII, 371 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Pieprzyk, Josef.
Publication:
. XVI, 311 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Informatics
by Aberer, Karl.
Publication:
. XIV, 560 p. 162 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Mitchell, Chris J.
Publication:
. X, 117 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyberspace Safety and Security
by Xiang, Yang.
Publication:
. XIV, 510 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|