|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 362p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Chung, Yongwha.
Publication:
. XIII, 352p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Bao, Feng.
Publication:
. XIII, 460p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 263p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|