|
|
Information Security, Practice and Experience
by Kwak, Jin.
Publication:
. XIII, 399p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2010
by Bernstein, Daniel J.
Publication:
. XIII, 437p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ethics and Policy of Biometrics
by Kumar, Ajay.
Publication:
. VIII, 169p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Application
by Gollmann, Dieter.
Publication:
. X, 239p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects in Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 279p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
by Samarati, Pierangela.
Publication:
. XIII, 386p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2010
by Taniar, David.
Publication:
. XIX, 540 p. 227 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2010
by Taniar, David.
Publication:
. XIX, 570p. 284 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2010
by Taniar, David.
Publication:
. XIX, 602p. 258 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2010
by Taniar, David.
Publication:
. XXXVII, 628p. 271 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Information and Database Systems
by Nguyen, Ngoc Thanh.
Publication:
. XXIII, 477p. 196 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Database Systems for Advanced Applications
by Kitagawa, Hiroyuki.
Publication:
. XX, 485p. 256 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Social Computing
by Chai, Sun-Ki.
Publication:
. XV, 426p. 126 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Database Systems for Advanced Applications
by Kitagawa, Hiroyuki.
Publication:
. XXVIII, 646 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology - CT-RSA 2010
by Pieprzyk, Josef.
Publication:
. 397p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Massacci, Fabio.
Publication:
. X, 241 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Internet Technology
by Janowski, Tomasz.
Publication:
. XV, 283p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Networking
by Kant, Krishna.
Publication:
. XIX, 522p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|