|
|
Information Security and Cryptology – ICISC 2012
by Kwon, Taekyoung.
Publication:
. XIV, 512 p. 108 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Doerr, Joerg.
Publication:
. XVIII, 402 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Mangard, Stefan.
Publication:
. XII, 297 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Computing, Behavioral-Cultural Modeling and Prediction
by Greenberg, Ariel M.
Publication:
. XVI, 535 p. 166 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 383 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Basin, David.
Publication:
. XX, 287 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
System Analysis and Modeling: Theory and Practice
by Haugen, Øystein.
Publication:
. X, 249 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Medical Content-Based Retrieval for Clinical Decision Support
by Greenspan, Hayit.
Publication:
. VIII, 145 p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Hiding
by Kirchner, Matthias.
Publication:
. X, 285 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVII
by Christianson, Bruce.
Publication:
. X, 367 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Language Engineering
by Czarnecki, Krzysztof.
Publication:
. XII, 413 p. 172 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Engineering
by Lucia, Andrea.
Publication:
. X, 237 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematical and Engineering Methods in Computer Science
by Kučera, Antonín.
Publication:
. XII, 213 p. 32 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Pietro, Roberto.
Publication:
. XIV, 333 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Component Software
by Păsăreanu, Corina S.
Publication:
. X, 277 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XVII
by Gavrilova, Marina L.
Publication:
. XII, 199 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Tools for Practical Software Verification
by Meyer, Bertrand.
Publication:
. VIII, 183 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Component Software
by Arbab, Farhad.
Publication:
. X, 369 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XX
by Christianson, Bruce.
Publication:
. X, 277 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Current Trends in Web Engineering
by Grossniklaus, Michael.
Publication:
. XXII, 245 p. 95 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|