|
|
Intelligence and security informatics for international security : , Information sharing and data mining /
by Chen, Hsinchum
Publication:
New York : Springer, 2006
. xvii, 182 p. :
Date:2006
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Technology Convergence, Secure and Trust Computing, and Data Management
by Park, Jong Hyuk (James).
Publication:
. XXXII, 296 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Information Technology, Application, and Service
by J. (Jong Hyuk) Park, James.
Publication:
. LV, 768 p. 356 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
IT Security Management
by Partida, Alberto.
Publication:
. XXXV, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multimedia Processing, Communication and Computing Applications
by Swamy, Punitha P.
Publication:
. XXXV, 345 p. 185 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Information and Communication Security
by Stavroulakis, Peter.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Signal Processing Systems
by Bhattacharyya, Shuvra S.
Publication:
. XXI, 1399 p. 708 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced DPA Theory and Practice
by Peeters, Eric.
Publication:
. XVI, 139 p. 70 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Unclonable Functions in Theory and Practice
by Böhm, Christoph.
Publication:
. XVIII, 270 p. 217 illus., 146 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Signal Processing Systems
by Bhattacharyya, Shuvra S.
Publication:
. XXXVIII, 1117p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Integrated Circuits and Systems
by Verbauwhede, Ingrid M.R.
Publication:
. X, 246p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Data Mining and Applications
by Motoda, Hiroshi.
Publication:
. XXII, 538 p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Bagchi, Aditya.
Publication:
. XVI, 404 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Middleware 2013
by Eyers, David.
Publication:
. XV, 498 p. 238 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology - ASIACRYPT 2013
by Sako, Kazue.
Publication:
. XXIV, 542 p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology - ASIACRYPT 2013
by Sako, Kazue.
Publication:
. XXIV, 546 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Number Theory and Cryptography
by Fischlin, Marc.
Publication:
. XII, 281 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Conceptual Modeling
by Ng, Wilfred.
Publication:
. XXVIII, 514 p. 165 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XXI
by Christianson, Bruce.
Publication:
. X, 267 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|