//]]>
Information Security and Cryptology – ICISC 2012 by Kwon, Taekyoung. Publication: . XIV, 512 p. 108 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Doerr, Joerg. Publication: . XVIII, 402 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral-Cultural Modeling and Prediction by Greenberg, Ariel M. Publication: . XVI, 535 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
System Analysis and Modeling: Theory and Practice by Haugen, Øystein. Publication: . X, 249 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Medical Content-Based Retrieval for Clinical Decision Support by Greenspan, Hayit. Publication: . VIII, 145 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Kirchner, Matthias. Publication: . X, 285 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Language Engineering by Czarnecki, Krzysztof. Publication: . XII, 413 p. 172 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Engineering by Lucia, Andrea. Publication: . X, 237 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical and Engineering Methods in Computer Science by Kučera, Antonín. Publication: . XII, 213 p. 32 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Pietro, Roberto. Publication: . XIV, 333 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Component Software by Păsăreanu, Corina S. Publication: . X, 277 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XVII by Gavrilova, Marina L. Publication: . XII, 199 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Tools for Practical Software Verification by Meyer, Bertrand. Publication: . VIII, 183 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Component Software by Arbab, Farhad. Publication: . X, 369 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XX by Christianson, Bruce. Publication: . X, 277 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Trends in Web Engineering by Grossniklaus, Michael. Publication: . XXII, 245 p. 95 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart