|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Mitchell, Chris J.
Publication:
. X, 117 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Takagi, Tsuyoshi.
Publication:
. XIII, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Keromytis, Angelos D.
Publication:
. XI, 416 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Visconti, Ivan.
Publication:
. XI, 582 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Susilo, Willy.
Publication:
. XIV, 460p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability and Security for Business, Enterprise and Health Information Systems
by Tjoa, A Min.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Privacy
by Camenisch, Jan.
Publication:
. Approx. 800 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|