|
|
Information Systems Security
by Bagchi, Aditya.
Publication:
. XVI, 404 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Number Theory and Cryptography
by Fischlin, Marc.
Publication:
. XII, 281 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XXI
by Christianson, Bruce.
Publication:
. X, 267 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructure Security
by Bologna, Sandro.
Publication:
. XII, 227 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Sakiyama, Kazuo.
Publication:
. XII, 319 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Gierlichs, Benedikt.
Publication:
. XIV, 191 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Palamidessi, Catuscia.
Publication:
. X, 213 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 249 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Engineering and Intelligence Informatics
by Cuzzocrea, Alfredo.
Publication:
. XIV, 466 p. 122 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Lightweight Cryptography for Security and Privacy
by Avoine, Gildas.
Publication:
. X, 143 p. 24 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Prouff, Emmanuel.
Publication:
. X, 215 p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Capitani di Vimercati, Sabrina.
Publication:
. X, 195 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVII
by Wang, Lingyu.
Publication:
. XIV, 305 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Cristofaro, Emiliano.
Publication:
. X, 265 p. 88 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Emerging Management Mechanisms for the Future Internet
by Doyen, Guillaume.
Publication:
. XVI, 161 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Huth, Michael.
Publication:
. XIV, 278 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|