//]]>
Fast Software Encryption by Hong, Seokhie. Publication: . XI, 385p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product-Focused Software Process Improvement by Ali Babar, M. Publication: . XIII, 410p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXIV by Foresti, Sara. Publication: . XIII, 376p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Zhou, Jianying. Publication: . XIII, 564p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing in Sensor Systems by Rajaraman, Rajmohan. Publication: . XVII, 410p. 152 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chen, Hsinchun. Publication: . 183p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computer Science and Information Technology by Kim, Tai-hoon. Publication: . XIII, 604p. 261 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecting Critical Systems by Giese, Holger. Publication: . 205p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Swarm Intelligence by Tan, Ying. Publication: . 772p. 262 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Swarm Intelligence by Tan, Ying. Publication: . XXVI, 746p. 234 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wired/Wireless Internet Communications by Osipov, Evgeny. Publication: . X, 400p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIII, 281p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Experimental Algorithms by Festa, Paola. Publication: . XII, 514p. 126 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2010 by Gilbert, Henri. Publication: . XIV, 694p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Architectures for Parallel Processing by Hsu, Ching-Hsien. Publication: . XXX, 468p. 234 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Architectures for Parallel Processing by Hsu, Ching-Hsien. Publication: . 580p. 295 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Information Systems Engineering by Pernici, Barbara. Publication: . XVI, 548p. 164 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2010 by Nguyen, Phong Q. Publication: . XIII, 519p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Trustworthy Elections by Chaum, David. Publication: . VIII, 403p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Sendrier, Nicolas. Publication: . X, 241p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart