|
|
Computer Information Systems and Industrial Management
by Cortesi, Agostino.
Publication:
. XII, 444 p. 176 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Architectures for Parallel Processing
by Xiang, Yang.
Publication:
. XXI, 563 p. 241 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Visconti, Ivan.
Publication:
. XI, 582 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 177 p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communication Technologies
by Szabó, Róbert.
Publication:
. X, 450 p. 164 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. VIII, 239 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identity
by Kiayias, Aggelos.
Publication:
. X, 257 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet of Things, Smart Spaces, and Next Generation Networking
by Andreev, Sergey.
Publication:
. XV, 464 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Convergence and Hybrid Information Technology
by Lee, Geuk.
Publication:
. XX, 763 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Gao, Hong.
Publication:
. XV, 486p. 227 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2012
by Safavi-Naini, Reihaneh.
Publication:
. XV, 888 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2011
by Kim, Howon.
Publication:
. XII, 512 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Algorithms, Systems, and Applications
by Wang, Xinbing.
Publication:
. XII, 680 p. 295 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 319p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVI
by Cuppens-Boulahia, Nora.
Publication:
. X, 340 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - AFRICACRYPT 2012
by Mitrokotsa, Aikaterini.
Publication:
. XI, 424p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Bao, Feng.
Publication:
. XIV, 580p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing
by Kay, Judy.
Publication:
. Approx. 495 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|