Information Technology Convergence, Secure and Trust Computing, and Data Management by Park, Jong Hyuk (James). Publication: . XXXII, 296 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Chaos-Based Cryptography by Kocarev, Ljupco. Publication: . X, 390p. 161 illus., 67 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Video and Audio Broadcasting Technology by Fischer, Walter. Publication: . XXVII, 800p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Information and Communication Security by Stavroulakis, Peter. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computational Science, Engineering and Information Technology by Nagamalai, Dhinaharan. Publication: . XX, 326 p. 135 illus., 13 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Speech Dereverberation by Naylor, Patrick A. Publication: . XVIII, 388p. 126 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced DPA Theory and Practice by Peeters, Eric. Publication: . XVI, 139 p. 70 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy-Preserving Machine Learning for Speech Processing by Pathak, Manas A. Publication: . XVII, 141 p. 21 illus., 13 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Securing Wireless Communications at the Physical Layer by Liu, Ruoheng. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing by Afek, Yehuda. Publication: . XXIV, 586 p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cellular Automata and Discrete Complex Systems by Kari, Jarkko. Publication: . X, 187 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Chan, T-H. Hubert. Publication: . XV, 356 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Jürjens, Jan. Publication: . XII, 231 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Pieprzyk, Josef. Publication: . XVI, 311 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Jøsang, Audun. Publication: . X, 247 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Chim, Tat Wing. Publication: . XVI, 506 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy in Statistical Databases by Domingo-Ferrer, Josep. Publication: . XII, 365 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Watermarking by Shi, Yun Qing. Publication: . X, 512 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 Next >>