|
|
Fast Software Encryption
by Hong, Seokhie.
Publication:
. XI, 385p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Ali Babar, M.
Publication:
. XIII, 410p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXIV
by Foresti, Sara.
Publication:
. XIII, 376p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Zhou, Jianying.
Publication:
. XIII, 564p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing in Sensor Systems
by Rajaraman, Rajmohan.
Publication:
. XVII, 410p. 152 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chen, Hsinchun.
Publication:
. 183p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Computer Science and Information Technology
by Kim, Tai-hoon.
Publication:
. XIII, 604p. 261 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecting Critical Systems
by Giese, Holger.
Publication:
. 205p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Swarm Intelligence
by Tan, Ying.
Publication:
. 772p. 262 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Swarm Intelligence
by Tan, Ying.
Publication:
. XXVI, 746p. 234 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wired/Wireless Internet Communications
by Osipov, Evgeny.
Publication:
. X, 400p. 198 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIII, 281p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Experimental Algorithms
by Festa, Paola.
Publication:
. XII, 514p. 126 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2010
by Gilbert, Henri.
Publication:
. XIV, 694p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Architectures for Parallel Processing
by Hsu, Ching-Hsien.
Publication:
. XXX, 468p. 234 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Architectures for Parallel Processing
by Hsu, Ching-Hsien.
Publication:
. 580p. 295 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Information Systems Engineering
by Pernici, Barbara.
Publication:
. XVI, 548p. 164 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2010
by Nguyen, Phong Q.
Publication:
. XIII, 519p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards Trustworthy Elections
by Chaum, David.
Publication:
. VIII, 403p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Sendrier, Nicolas.
Publication:
. X, 241p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|