|
|
Advances in Cryptology – CRYPTO 2012
by Safavi-Naini, Reihaneh.
Publication:
. XV, 888 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 319p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computers Helping People with Special Needs
by Miesenberger, Klaus.
Publication:
. XXX, 683 p. 264 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computers Helping People with Special Needs
by Miesenberger, Klaus.
Publication:
. XXX, 723 p. 258 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Logic, Language and Meaning
by Aloni, Maria.
Publication:
. XII, 482 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Haptics: Perception, Devices, Mobility, and Communication
by Isokoski, Poika.
Publication:
. XX, 226p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Haptics: Perception, Devices, Mobility, and Communication
by Isokoski, Poika.
Publication:
. XVI, 650p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Diagrammatic Representation and Inference
by Cox, Philip.
Publication:
. XIII, 358p. 202 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing
by Kay, Judy.
Publication:
. Approx. 495 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Dieste, Oscar.
Publication:
. XVI, 378p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Persuasive Technology. Design for Health and Safety
by Bang, Magnus.
Publication:
. Approx. 295 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
by Askoxylakis, Ioannis.
Publication:
. XII, 225p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent and Multi-Agent Systems. Technologies and Applications
by Jezic, Gordan.
Publication:
. XVII, 661p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Katzenbeisser, Stefan.
Publication:
. XII, 341p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 207p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Telecommunication Economics
by Hadjiantonis, Antonis M.
Publication:
. IX, 243 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Álvarez, Federico.
Publication:
. XXV, 252 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Meadows, Catherine.
Publication:
. X, 239p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Schindler, Werner.
Publication:
. Approx. 280 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. XII, 185 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|