|
|
Wired/Wireless Internet Communications
by Osipov, Evgeny.
Publication:
. X, 400p. 198 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2010
by Gilbert, Henri.
Publication:
. XIV, 694p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2010
by Nguyen, Phong Q.
Publication:
. XIII, 519p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Sendrier, Nicolas.
Publication:
. X, 241p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security, Practice and Experience
by Kwak, Jin.
Publication:
. XIII, 399p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2010
by Bernstein, Daniel J.
Publication:
. XIII, 437p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Application
by Gollmann, Dieter.
Publication:
. X, 239p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects in Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 279p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
by Samarati, Pierangela.
Publication:
. XIII, 386p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology - CT-RSA 2010
by Pieprzyk, Josef.
Publication:
. 397p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Networking
by Kant, Krishna.
Publication:
. XIX, 522p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Luiijf, Eric.
Publication:
. XIV, 219 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyberspace Safety and Security
by Wang, Guojun.
Publication:
. XXVI, 480 p. 149 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Stabilization, Safety, and Security of Distributed Systems
by Higashino, Teruo.
Publication:
. XXIV, 380 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Abdalla, Michel.
Publication:
. XVIII, 349 p. 52 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Das, Sajal K.
Publication:
. X, 265 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Ubiquitous Computing
by Khalil, Ismail.
Publication:
. XIX, 267 p. 117 illus., 47 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Internet Technologies
by Su, Jinshu.
Publication:
. XII, 277 p. 132 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|