|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Kutyłowski, Mirosław.
Publication:
. XII, 393 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wired/Wireless Internet Communication
by Tsaoussidis, Vassilis.
Publication:
. XII, 277 p. 145 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2013
by Johansson, Thomas.
Publication:
. XIV, 736 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Infocomm Technology
by Guyot, Vincent.
Publication:
. XVI, 358 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Deng, Robert H.
Publication:
. XIV, 388 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Grid Security
by Cuellar, Jorge.
Publication:
. VIII, 151 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Jøsang, Audun.
Publication:
. X, 321 p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Health Information Science
by Huang, Guangyan.
Publication:
. XIV, 280 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing - ICSOC 2012 Workshops
by Ghose, Aditya.
Publication:
. XVI, 466 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology – ICISC 2012
by Kwon, Taekyoung.
Publication:
. XIV, 512 p. 108 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Technologies and Applications
by Ishikawa, Yoshiharu.
Publication:
. XXVI, 845 p. 375 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Flegel, Ulrich.
Publication:
. X, 243 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Mangard, Stefan.
Publication:
. XII, 297 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 383 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fundamental Approaches to Software Engineering
by Cortellessa, Vittorio.
Publication:
. XX, 376 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing and the Networked World
by Zu, Qiaohong.
Publication:
. XXII, 921 p. 434 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Basin, David.
Publication:
. XX, 287 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communication Technology
by Mustofa, Khabib.
Publication:
. XVI, 552 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Sahai, Amit.
Publication:
. XII, 726 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|