|
|
Formal Aspects of Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 239 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Research Problems in Network Security
by Camenisch, Jan.
Publication:
. VIII, 171 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Privacy
by Camenisch, Jan.
Publication:
. Approx. 800 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Chung, Yongwha.
Publication:
. XIII, 352p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols
by Christianson, Bruce.
Publication:
. VIII, 257p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Echizen, Isao.
Publication:
. XIII, 371p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Martinelli, Fabio.
Publication:
. X, 303p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Bao, Feng.
Publication:
. XIII, 460p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
by Armando, Alessandro.
Publication:
. IX, 185p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 172p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Jha, Somesh.
Publication:
. 524p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2010
by Gritzalis, Dimitris.
Publication:
. XIV, 718p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Garay, Juan A.
Publication:
. VII, 474p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Katsikas, Sokratis.
Publication:
. XII, 252p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sion, Radu.
Publication:
. X, 257p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2010
by Rabin, Tal.
Publication:
. XIV, 744p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 263p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Atallah, Mikhail J.
Publication:
. X, 291p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Kurosawa, Kaoru.
Publication:
. X, 249p.
Availability:
Copies available:
AUM Main Library
(1),
|
|