|
|
On the Move to Meaningful Internet Systems: OTM 2011
by Meersman, Robert.
Publication:
. XXVIII, 430 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems: OTM 2011
by Meersman, Robert.
Publication:
. XXVII, 407 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Architectures for Parallel Processing
by Xiang, Yang.
Publication:
. XVIII, 411p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Architectures for Parallel Processing
by Xiang, Yang.
Publication:
. XVIII, 497p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Aspects in Information Technology
by Joye, Marc.
Publication:
. XIV, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Stabilization, Safety, and Security of Distributed Systems
by Défago, Xavier.
Publication:
. XIV, 452 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Boyen, Xavier.
Publication:
. XIII, 399 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2010
by Rhee, Kyung-Hyune.
Publication:
. XIII, 435p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2011
by Atluri, Vijay.
Publication:
. XIV, 686p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Sacchi, Claudio.
Publication:
. XIII, 255 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Sommer, Robin.
Publication:
. 398p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Warehousing and Knowledge Discovery
by Cuzzocrea, Alfredo.
Publication:
. XIV, 498p. 180 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Energy-Aware Communications
by Lehnert, Ralf.
Publication:
. XIII, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011 Workshops
by Casares-Giner, Vicente.
Publication:
. XVI, 290p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Furnell, Steven.
Publication:
. XII, 223 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXV
by Li, Yingjiu.
Publication:
. XI, 309p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|