//]]>
Electronic Government by Wimmer, Maria A. Publication: . XIV, 335 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 207p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analysis of Social Media and Ubiquitous Data by Atzmueller, Martin. Publication: . VIII, 163p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Janssen, Marijn. Publication: . XVI, 466 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVI by Christianson, Bruce. Publication: . IX, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 133p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VII by Butts, Jonathan. Publication: . XVI, 227 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software: Quality Verification by Petrinja, Etiel. Publication: . XIV, 277 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VI by Butts, Jonathan. Publication: . XVI, 233 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Auctions, Market Mechanisms, and Their Applications by Coles, Peter. Publication: . XII, 113 p. 16 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Forensics in Telecommunications, Information, and Multimedia by Lai, Xuejia. Publication: . XIII, 314p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Baggili, Ibrahim. Publication: . X, 157p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Camenisch, Jan. Publication: . XXIV, 512p. 122 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart