|
|
Information Technology Convergence, Secure and Trust Computing, and Data Management
by Park, Jong Hyuk (James).
Publication:
. XXXII, 296 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Proceedings of the International Conference on IT Convergence and Security 2011
by Kim, Kuinam J.
Publication:
. XIV, 642 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Trends for FPGAS
by Badrignans, Benoit.
Publication:
. XX, 252p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Machine Learning and Systems Engineering
by Ao, Sio-Iong.
Publication:
. XXII, 614 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
IT Security Management
by Partida, Alberto.
Publication:
. XXXV, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Internet
by Salgarelli, Luca.
Publication:
. XVIII, 369p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ISSE 2010 Securing Electronic Business Processes
by Pohlmann, Norbert.
Publication:
. XII, 416 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Networks and Security
by Khan, Shafiullah.
Publication:
. VIII, 512 p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Information and Communication Security
by Stavroulakis, Peter.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced DPA Theory and Practice
by Peeters, Eric.
Publication:
. XVI, 139 p. 70 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Unclonable Functions in Theory and Practice
by Böhm, Christoph.
Publication:
. XVIII, 270 p. 217 illus., 146 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
PBX Security and Forensics
by Androulidakis, Iosif I.
Publication:
. XX, 115 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Phone Security and Forensics
by Androulidakis, Iosif I.
Publication:
. XI, 103 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Embedded Devices
by Gebotys, Catherine H.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Integrated Circuits and Systems
by Verbauwhede, Ingrid M.R.
Publication:
. X, 246p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Distributed Computing Systems
by Pathan, Mukaddim.
Publication:
. XI, 400 p. 179 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Accorsi, Rafael.
Publication:
. X, 235 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems: OTM 2013 Conferences
by Meersman, Robert.
Publication:
. XXX, 775 p. 269 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Safety, Reliability, and Security
by Bitsch, Friedemann.
Publication:
. XVI, 304 p. 109 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented and Cloud Computing
by Lau, Kung-Kiu.
Publication:
. X, 244 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|