|
|
Interactive Theorem Proving
by Blazy, Sandrine.
Publication:
. XII, 498 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Mangard, Stefan.
Publication:
. XII, 297 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Networking
by Frey, Davide.
Publication:
. XX, 466 p. 121 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Programming Languages and Systems
by Jhala, Ranjit.
Publication:
. XII, 389 p. 104 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Distributed Computing Systems
by Xiang, Yang.
Publication:
. XIV, 289 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Ortmeier, Frank.
Publication:
. XVIII, 402 p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Ortmeier, Frank.
Publication:
. XVI, 530 p. 198 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems: OTM 2012
by Meersman, Robert.
Publication:
. XXV, 485 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems: OTM 2012
by Meersman, Robert.
Publication:
. XXVI, 467 p. 202 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Stabilization, Safety, and Security of Distributed Systems
by Richa, Andréa W.
Publication:
. XIX, 330 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented and Cloud Computing
by Paoli, Flavio.
Publication:
. XI, 282 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Gollmann, Dieter.
Publication:
. XIV, 402 p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2012
by Foresti, Sara.
Publication:
. XVII, 896 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identity
by Kiayias, Aggelos.
Publication:
. X, 257 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Convergence and Hybrid Information Technology
by Lee, Geuk.
Publication:
. XX, 763 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business System Management and Engineering
by Ardagna, Claudio A.
Publication:
. X, 197 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|