|
|
Transactions on Aspect-Oriented Software Development IX
by Leavens, Gary T.
Publication:
. XIV, 307 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Lee, Dong Hoon.
Publication:
. XII, 371 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Mitchell, Chris J.
Publication:
. X, 117 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyberspace Safety and Security
by Xiang, Yang.
Publication:
. XIV, 510 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Venkatakrishnan, Venkat.
Publication:
. XVI, 353 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Bellalta, Boris.
Publication:
. XII, 183 p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2012
by Wang, Xiaoyun.
Publication:
. XVI, 780 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2012
by Galbraith, Steven.
Publication:
. XIV, 566 p. 118 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Testing Software and Systems
by Nielsen, Brian.
Publication:
. X, 263 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Liu, Chengfei.
Publication:
. XX, 795 p. 258 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Grossklags, Jens.
Publication:
. XII, 309 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provenance and Annotation of Data and Processes
by Groth, Paul.
Publication:
. XII, 256 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Hanaoka, Goichiro.
Publication:
. XII, 261 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Large-Scale Complex IT Systems. Development, Operation and Management
by Calinescu, Radu.
Publication:
. XII, 417 p. 143 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Canteaut, Anne.
Publication:
. XII, 463 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model Driven Engineering Languages and Systems
by France, Robert B.
Publication:
. XX, 828 p. 298 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|