Electronic Government by Wimmer, Maria A. Publication: . XIV, 335 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Scholl, Hans J. Publication: . XIII, 279 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 207p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analysis of Social Media and Ubiquitous Data by Atzmueller, Martin. Publication: . VIII, 163p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Janssen, Marijn. Publication: . XVI, 466 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVI by Christianson, Bruce. Publication: . IX, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 133p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resistance, Liberation Technology and Human Rights in the Digital Age by Ziccardi, Giovanni. Publication: . VIII, 328 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Second Generation Biometrics: The Ethical, Legal and Social Context by Mordini, Emilio. Publication: . X, 353p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VII by Butts, Jonathan. Publication: . XVI, 227 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software: Quality Verification by Petrinja, Etiel. Publication: . XIV, 277 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Communications, Services and Security by Dziech, Andrzej. Publication: . XIV, 325 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VI by Butts, Jonathan. Publication: . XVI, 233 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Auditing and GRC Automation in SAP by Chuprunov, Maxim. Publication: . XXXII, 525 p. 273 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Security by Aschenbruck, Nils. Publication: . Approx. 530 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Auctions, Market Mechanisms, and Their Applications by Coles, Peter. Publication: . XII, 113 p. 16 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics VII by Peterson, Gilbert. Publication: . XVIII, 290 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Forensics in Telecommunications, Information, and Multimedia by Lai, Xuejia. Publication: . XIII, 314p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart