|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Security of Information and Communication Networks
by Awad, Ali Ismail.
Publication:
. XII, 249 p. 104 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Computing and Communications
by Thampi, Sabu M.
Publication:
. XVI, 404 p. 149 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Rogers, Marcus.
Publication:
. XIV, 329 p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Information Security and Privacy
by Böhme, Rainer.
Publication:
. XIII, 321 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
HCI International 2013 - Posters’ Extended Abstracts
by Stephanidis, Constantine.
Publication:
. XLIII, 773 p. 279 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Assurance and Security Education and Training
by Dodge, Ronald C.
Publication:
. XII, 297 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy Protection in Information Processing Systems
by Janczewski, Lech J.
Publication:
. XIV, 436 p. 117 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multimedia Communications, Services and Security
by Dziech, Andrzej.
Publication:
. XIV, 325 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Information Systems Engineering Workshops
by Franch, Xavier.
Publication:
. XLIV, 532 p. 167 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Information Systems
by Abramowicz, Witold.
Publication:
. XIV, 223 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust Management VII
by Fernández-Gago, Carmen.
Publication:
. XII, 289 p. 49 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quality, Reliability, Security and Robustness in Heterogeneous Networks
by Singh, Karan.
Publication:
. XVIII, 1011 p. 488 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Fischer-Hübner, Simone.
Publication:
. X, 161 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad Hoc Networks
by Zheng, Jun.
Publication:
. XII, 366 p. 168 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Communication Networks
by Keromytis, Angelos D.
Publication:
. X, 369 p. 111 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Personal Satellite Services
by Pillai, Prashant.
Publication:
. XIV, 197 p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Computing, Communication, and Control
by Unnikrishnan, Srija.
Publication:
. XVIII, 751 p. 452 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Process Management Workshops
by Rosa, Marcello.
Publication:
. LVI, 783 p. 264 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer and Computing Technologies in Agriculture VI
by Li, Daoliang.
Publication:
. XVIII, 455 p. 237 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|