|
|
Multiple Access Communications
by Sacchi, Claudio.
Publication:
. XIII, 255 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Sommer, Robin.
Publication:
. 398p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Warehousing and Knowledge Discovery
by Cuzzocrea, Alfredo.
Publication:
. XIV, 498p. 180 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011 Workshops
by Casares-Giner, Vicente.
Publication:
. XVI, 290p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Furnell, Steven.
Publication:
. XII, 223 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Spaces and Next Generation Wired/Wireless Networking
by Balandin, Sergey.
Publication:
. XVI, 634 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXV
by Li, Yingjiu.
Publication:
. XI, 309p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2011
by Nitaj, Abderrahmane.
Publication:
. XIII, 387p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Joux, Antoine.
Publication:
. XI, 417p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by McCune, Jonathan M.
Publication:
. VII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Lopez, Javier.
Publication:
. XIII, 552 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
by Ardagna, Claudio A.
Publication:
. XIII, 392 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011
by Domingo-Pascual, Jordi.
Publication:
. XXII, 381 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2011
by Domingo-Pascual, Jordi.
Publication:
. XXI, 473 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Fehr, Serge.
Publication:
. X, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2011
by Paterson, Kenneth G.
Publication:
. XIV, 628p.
Availability:
Copies available:
AUM Main Library
(1),
|
|