|
|
IT Security Management
by Partida, Alberto.
Publication:
. XXXV, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Bagchi, Aditya.
Publication:
. XVI, 404 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XXI
by Christianson, Bruce.
Publication:
. X, 267 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Hämmerli, Bernhard M.
Publication:
. XIV, 277 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructure Security
by Bologna, Sandro.
Publication:
. XII, 227 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Distributed Computing Systems
by Pathan, Mukaddim.
Publication:
. XI, 400 p. 179 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Sakiyama, Kazuo.
Publication:
. XII, 319 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Attacks, Intrusions, and Defenses
by Stolfo, Salvatore J.
Publication:
. XII, 476 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Gierlichs, Benedikt.
Publication:
. XIV, 191 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Bitsch, Friedemann.
Publication:
. XVI, 304 p. 109 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 249 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Communication Networking
by Bauschert, Thomas.
Publication:
. XII, 322 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Lightweight Cryptography for Security and Privacy
by Avoine, Gildas.
Publication:
. X, 143 p. 24 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Prouff, Emmanuel.
Publication:
. X, 215 p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Capitani di Vimercati, Sabrina.
Publication:
. X, 195 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Wang, G. Alan.
Publication:
. X, 117 p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVII
by Wang, Lingyu.
Publication:
. XIV, 305 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|