|
|
Web Information Systems Engineering – WISE 2011 and 2012 Workshops
by Haller, Armin.
Publication:
. XVI, 350 p. 105 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Health Information Science
by Huang, Guangyan.
Publication:
. XIV, 280 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing - ICSOC 2012 Workshops
by Ghose, Aditya.
Publication:
. XVI, 466 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 383 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Basin, David.
Publication:
. XX, 287 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public-Key Cryptography – PKC 2013
by Kurosawa, Kaoru.
Publication:
. XIV, 518 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agents and Data Mining Interaction
by Cao, Longbing.
Publication:
. XII, 217 p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Pietro, Roberto.
Publication:
. XIV, 333 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Liu, Chengfei.
Publication:
. XX, 795 p. 258 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Computing and Applications
by Liu, Baoxiang.
Publication:
. XX, 782 p. 262 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Information Systems and Mining
by Wang, Fu Lee.
Publication:
. XVIII, 718 p. 271 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented and Cloud Computing
by Paoli, Flavio.
Publication:
. XI, 282 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Attacks, Intrusions, and Defenses
by Balzarotti, Davide.
Publication:
. XIV, 400 p. 119 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2012
by Foresti, Sara.
Publication:
. XVII, 896 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Process Management
by Barros, Alistair.
Publication:
. XV, 354 p. 128 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. VIII, 239 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|