A

Selected list of Books

on

A

Bibliography Compiled

ByResource Centre

(Prepared on : 13th Dec. 2010)

Resource Centre
Near Indroda Circle

Gandhinagar - 382 007


(Available in the Resource Centre)
Acquisti, Alessandro ...[et al.] (eds.)
Digital privacy : theory, technologies, and practices
New York. Auerbach Publications, 2007
005.8 ACQ
018761
Acquisti, Alessandro ...[et al.] (eds.)
Digital privacy : theory, technologies, and practices
New York. Auerbach Publications, 2007
005.8 ACQ
018761
Afyouni, Hassan A.
Database security and auditing : protecting data integrity and accessibility
Boston. Thomson Course Technology, 2006
005.8 AFY
016388
Aggarwal, Charu C. & Yu, Philip S.
Privacy-preserving data mining : models and algorithms
New York. Springer, 2008
005.74 AGG
021394
Aggelou, George
Mobile ad hoc networks: from wireless LANs to 4G networks.
New York. McGraw-Hill, 2005.
004.688 AGG
013373
Agnew, Grace.,
Digital rights management : a librarian's guide to technology and practice
Oxford. Chandos Publishing, 2008
025.12 AGN
020194
Agre, Philip E.
Technology and Privacy
London . The MIT Press , 2001
005.8 A276T
003689
Agre, Philip E. ,
Technology and Privacy
London . The MIT Press , 2001
005.8 A276T
003689
Al Agha, Khaldoun, ed. & Omidyar, Cambyse Guy, ed.
Mobile and wireless communications networks: 5th IFIP-TC6 International Conference: proceedings.
New Jersey. World Scientific, 2003.
621.3821 ALA
009057
Alder, Raven ... [et al.]
How to cheat at configuring Open Source security tools
New Delhi. Syngress, 2007
005.8 ALD
017787
Aleksy, Markus, Korthaus, Axel & Schader, Martin.,
Implementing distributed systems with Java and CORBA
New York. Springer, 2005
005.44 ALE
019696
Allen, Julia H.
CERT guide to system and network security practices
Boston. Addison-Wesley, 2001
005.8 ALL
007447
Anderson, Ross J.
Security engineering : a guide to building dependable distributed systems
New York. Wiley-DreamtechIndia, 2003
005.8 AND 005797
Anderson, Ross J.
Security engineering : a guide to building dependable distributed systems
New York. Wiley-DreamtechIndia, 2003
005.8 AND
005797
Anderson, Ross J.
Security engineering: a guide to building dependable distributed systems, 2nd ed.
New Delhi. Wiley India, 2008
005.1 AND
021324
Anjum, Farooq & Mouchtaris, Petros
Security for wireless ad-hoc networks
Hoboken. Wiley-Interscience, 2007
005.8 ANJ
015531
Anonymous
Maximum Security
New Delhi. Techmedia, 1998
005.8 ANO
000165
Arnold, Michael ...[et al.]
Techniques and applications of digital watermarking and content protection
Boston. Artech House, 2003
005.8 ARN
007430
Avoine, Gildas, Junod, Pascal & Oechslin, Philippe
Computer system security : basic concepts and solved exercises
Boca Raton. CRC Press, 2007
005.8 AVO
019821
Aycock, John.,
Computer viruses and malware
New York. Springer, 2006
005.84 AYC
014696
Bacon, Jean
Concurrent Systems
New York . Addison-Wesley , 1997
005.4475 BAC
002343
Bacon, Jean.,
Concurrent systems : an integrated approach to operating systems, distributed systems and databases, 3rd ed.
Harlow. Addison-Wesley, 2003
004.35 BAC
016020
Ballard, Jason & Ratliff, Bud
Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant
New Delhi. Prentice Hall of India, 2003
005.8 BAL
021963
Bandyopadhyay, Somprakash, Roy, Siuli & Ueda, Tetsuro
Enhancing the performance of ad hoc wireless networks with smart antennas.
Boca Raton. Auerbach Publications, 2006.
621.3981 BAN
015870
Barbeau, Michel & Kranakis, Evangelos
Principles of ad hoc networking.
Chichester. John Wiley & Sons, 2007.
621.382 BAR
017488
Bardram, Jakob E., ed., Mihailidis, Alex, ed. & Wan, Dadong, ed.
Pervasive computing in healthcare
Boca Raton. CRC Press, 2007
610.28 BAR
023282
Baresi, Luciano, ed. & Di Nitto, Elisabetta, ed.
Test and analysis of Web services
Berlin. Springer, 2007
005.8 BAR
018547
Barile, Ian
Protecting your PC
Boston. Charles River Media, 2007
005.8 BAR
016578
Barken, Lee
How secure is your wireless network? : safeguarding your Wi-Fi-LAN
UpperSaddleRiver. Prentice Hall PTR, 2004
005.8 BAR
017628
Barman, Scott
Writing information security policies
Boston. New Riders, 2002
005.8 BAR
006865
Barman, Scott.,
Writing information security policies
Boston. New Riders, 2002
005.8 BAR
006865
Barrett, Daniel J., Richard, Silverman E. & Byrnes, Robert G.
Linux security cookbook
Navi Mumbai. SPD/O'Reilly, 2003
005.8 BAR
009407
Barwise, Jon & Seligman, Jerry.,
Information flow : the logic of distributed systems
Cambridge. CambridgeUniversity Press, 1997
003.54 BAR
008614
Basagni, Stefano, ed., Conti, Marco, ed., Giordano, Silvia, ed. & Stojmenovic, Ivan, ed.
Mobile ad hoc networking.
Canada. IEEE Press, 2004.
004.68 BAS
012559
Becker, Eberhard, Ed., Buhse, Willms, Ed., Gunnewig, Dirk, Ed. & Rump, Niels, Ed.
Digital rights management : technological, economic, legal and political aspects
New York. Springer-Verlag, 2003
004 BEC
008462
Belapurkar, Abhijit ... [et al.]
Distributed systems security : issues, processes and solutions
Hoboken. Wiley, 2009
005.8 BEL 022239
Belapurkar, Abhijit ... [et al.]
Distributed systems security : issues, processes and solutions
Hoboken. Wiley, 2009
005.8 BEL
022239
Benantar, Messaoud, ed.
Access control systems : security, identity management and trust models
New York. Springer, 2006
005.8 BEN
015251
Benantar, Messaoud, ed.
Access control systems : security, identity management and trust models
New York. Springer, 2006
005.8 BEN
015251
Bertino, Elisa ... [et al.]
Security for web services and service-oriented architectures
Berlin. Springer, 2010
005.8 BER
023804
Bhanu, Bir & Chen, Hui.,
Human ear recognition by computer
London. Springer, 2008,
006.4 BHA
021402
Bhaskar, S. M. & Ahson, S. I.
Information security : a practical approach
New Delhi. Narosa Publishing House, 2008
005.8 BHA
025300
Birman, Kenneth P.
Reliable distributed systems : technologies, web services, and applications
New York. Springer, 2005
004.6 BIR
013382
Bishop, Matt
Computer security : art and science
New Delhi. Pearson Education, 2003
005.8 BIS
007583 - 007585
Bishop, Matt
Introduction to computer security
Boston. Addison-Wesley, 2004
005.8 BIS
011751
Biskup, Joachim
Security in computing systems : challenges, approaches and solutions
New York. Springer, 2009
005.8 BIS
021705
Blakley, Bob
CORBA Security
England. Addison-Wesley, 1999
005.8 BLA
002740
Boger, Marko.,
Java in distributed systems : concurrency, distribution and persistence
Chichester. John Wiley and Sons, 2001
005.2762 BOG
005953
Boyd, Colin & Mathuria, Anish.,
Protocols for authentication and key establishment
Berlin. Springer-Verlag, 2003
005.82 BOY
007550
Boyd, Colin & Mathuria, Anish.,
Protocols for authentication and key establishment
Berlin. Springer-Verlag, 2003
005.82 BOY
007182
Bragg, Roberta
Hardening windows systems : bulletproof your systems before you are hacked
New Delhi. Tata McGraw-Hill, 2004
005.8 BRA
013606
Bragg, Roberta, Phodes-Ousley, Mark & Strassberg, Keith
Network security : the complete reference
New Delhi. Tata McGraw-Hill, 2005
005.8 BRA
013605
Brancik, Kenneth C.
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
Boca Raton. Auerbach Publications, 2008
005.8 BRA
021726
Brands, Stefan A.
Rethinking public key infrastructures and digital certificates: Building in privacy
Cambridge. The MIT Press, 2000
005.8 BRA 007469
Brands, Stefan A.
Rethinking public key infrastructures and digital certificates: Building in privacy
Cambridge. The MIT Press, 2000
005.8 BRA
007469
Brands, Stefan A.,
Rethinking public key infrastructures and digital certificates: Building in privacy
Cambridge. The MIT Press, 2001
005.8 BRA
007904
Branigan, Steven
High-tech crimes revealed : cyberwar stories from the digital front
Boston. Addison-Wesley, 2005
005.8 BRA 017430
Brooks, Richard R.
Disruptive security technologies with mobile code and peer to peer networks
Boca Raton. CRC Press, 2004
005.8 BRO
011813
Brown, Keith
Programming Windows Security
Boston . Addison-Wesley , 2000
005.8 BRO
004682
Bruce, Glen & Dempsey, Rob
Security in distributed computing : did you lock the door?
New Jersey. Pearson Education, 1997
005.8 BRU
008925
Bruen, Aiden A. & Forcinito, Mario A.
Cryptography, information theory, and error-correction : a handbook for the twenty first century
New Jersey. John Wiley and Sons, 2005
005.8 BRU
012735
Buchanan, William.,
Distributed systems and networks
New Delhi. Tata McGraw-Hill, 2004
004.36 BUC
010118
Burton, James, Dubrawsky, Ido, Osipov, Vitaly & Baumrucker, C. Tate ... [et al]
Cisco security professional's guide to secure intrusion detection systems
Rockland. Syngress, 2003
005.8 BUR
009720
Buttyan, Levente & Hubaux, Jean-Pierre
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
Cambridge. CambridgeUniversity Press, 2008
005.8 BUT
022428
Cache, Johnny & Liu, Vincent
Hacking exposed wireless : wireless security secrets & solutions
New Delhi. Tata McGraw-Hill, 2007
005.8 CAC
023441
Calabrese, Thomas
Information security intelligence : cryptographic principles and applications
Australia. Thomson, 2004
005.8 CAL
010569
Calabrese, Thomas.,
Information security intelligence : cryptographic principles and applications
Australia. Thomson, 2004
005.8 CAL
010569
Caloyannides, Michael A.
Computer forensics and privacy
Boston. Artech House, 2001
005.8 CAL
007609
Caloyannides, Michael A.,
Computer forensics and privacy
Boston. Artech House, 2001
005.8 CAL
007609
Campbell, Paul, Calvert, Ben & Boswell, Steven
Security+
Australia. Thomson Asia, 2004
005.8 CAM
009495
Cannings, Rich, Dwivedi, Himanshu & Lackey, Zane
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions
New York. McGraw Hill, 2008
005.8 CAN 021122
Carlson, Reinhold A.,
Understanding building automation systems : direct digital control, energy management, life safety, security/access control, lighting, building management programs
Kingston. R.S. Means Co., 1991
696 CAR
022855
Carr, Houston H. & Snyder, Charles A.
Data communications and network security
New Delhi. McGraw-Hill, 2007
005.8 CAR
016755
Carter, Brian & Shumway, Russell
Wireless security : end to end. Indianapolis
Wiley Pub., 2002
005.8 CAR
020569
Cayirci, Erdal & Rong, Chunming
Security in wireless ad hoc and sensor networks
Chichester. John Wiley & Sons, 2007
005.8 CAY
025032
Cerven, Pavol
Crackproof your software : protect your software against crackers
San Francisco. No Starch Press, 2002
005.8 CER
011369
Chadha, Ritu & Kant, Lahta
Policy-driven mobile ad hoc network management. Hoboken.
Wiley-Interscience, 2008.
004.6 CHA
022106
Chakrabarti, Anirban
Grid computing security
Berlin. Springer, 2007
005.8 CHA
015945
Challener, David ... [et al.]
Practical guide to trusted computing
UpperSaddleRiver. IBM Press, 2008
005.8 CHA
022378
Chander, Vipperla Ravi
Incorporation of mobility model of nodes in zone routing protocol for mobile ad hoc wireless networks.
Gandhinagar. Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), 2004.
004.65 CHA
T00008
Chandra, Praphul
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security
Amsterdam. Newnes, 2005
005.8 CHA
015148
Chandra, Praphul
Bulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security. Amsterdam. Newnes, 2005.
005.8 CHA
015148
Chess, Brian.,
Secure programming with static analysis
New Jersey. Addison-Wesley, 2007
005.8 CHE
017470
Cheswick, William R., Bellovin, Steven M. & Rubin, Aviel D.
Firewalls and Internet security : repelling the wily hacker, 2nd ed.
New Delhi. Pearson Education, 2006
005.8 CHE
017767
Chin, Shiu-Kai & Older, Susan
Access control, security, and trust : a logical approach
New York. CRC Press, 2009
005.8 CHI
025198
Chin, Shiu-Kai & Older, Susan
Access control, security, and trust : a logical approach
New York. CRC Press, 2009
005.8 CHI
025198
Chirillo, John
Network security for windows
Delhi. Wiley Publishing, 2002
005.8 CHI
004460
Cole, Eric, Krutz, Ronald & Conley, James W.
Network security bible
New Delhi. Wiley-DreamtechIndia, 2005
005.8 COL
012374
Collberg, Christian & Nagra, Jasvir.,
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
New Jersey. Addison-Wesley, 2010
005.8 COL
023403
Collins, Dave.,
Designing object-oriented user interfaces
Boston. Addison-Wesley, 1995
005.12 COL
007681, 007435
Conklin, Arthur, White, Gregory B., Cothren, Chuck & Williams, Dwayne ... [et al.]
Principles of computer security : security+ and beyond
Boston. McGraw-Hill, 2005
005.8 CON
011863
Conti, Greg
Security data visualization : graphical techniques for network analysis
San Francisco. No Starch Press, 2007
005.8 CON
018980
Convery, Sean & Cisco Systems, Inc.
Network security architectures
Indianapolis. Cisco Press, 2004
005.8 CON
022493
Conway, Richard & Cordingley, Julian
Code hacking : a developer's guide to network security
Mumbai. Shroff Publishers, 2004
005.8 CON
013486
Cook, Debra L. & Keromytis, Angelos D.,
Cryptographics : exploiting graphics cards for security
New York. Springer, 2006
005.8222 COO
014591
Coulouris, George F., Dollimore, Jean & Kindberg, Tim.,
Distributed systems : concepts and design, 4th ed.
New Delhi. Pearson Education, 2005
004.36 COU
022069
Coulouris, George, Dollimore, Jean & Kindberg, Tim.,
Distributed systems : concepts and design, 2nd ed.
Delhi. Pearson Education Asia, 2000
004.3681 COU
000730
Cox, Kerry & Gerg, Christopher
Managing security with snort and IDS tools
Mumbai. SPD, 2004
005.8 GER
011630
Craiger, Philip, ed. & Shenoi, Sujeet, ed
Advances in Digital Forensics III
New York. Springer, 2007
363.25 CRA
019055
Cranor, Lorrie Faith
Web privacy with P3P
Navi Mumbai. Shroff Publishers, 2002
005.8 CRA
010274
Cranor, Lorrie Faith
Web privacy with P3P
Navi Mumbai. Shroff Publishers, 2002
005.8 CRA
010274
Cretaro, Paul
Lab manual for Security+ guide to network security fundamentals, 2nd ed.
Boston. Thomson Course Technology, 2005
005.8 CRE
022153
Cross, Michael ... [et al.]
Web application vunerabilities : detect, exploit, prevent
Burlington. Syngress Pub., 2007
005.8 CRO
022290
Cross, Michael ... [et al.]
Web application vunerabilities : detect, exploit, prevent
Burlington. Syngress Pub., 2007
005.8 CRO
022406
Cross, Michael ...[et al.]
Security + study guide & DVD training system
Navi Mumbai. Shroff Publishers, 2003
005.8 CRO
007362
Crume, Jeff
Inside Internet security : what hackers don't want you to know
England. Addison-Wesley, 2000
005.8 CRU
012969
Damiani, Ernesto, Ardagna, Claudio Agostino & Ioini, Nabil el
Open source systems security certification
New York. Springer, 2009
005.8 DAM
022286
Daswani, Neil, Kern, Christoph & Kesavan, Anita
Foundations of security : what every programmer needs to know
Berkeley. Apress, 2007
005.8 DAS
024147 - 024151
Datta, Anupam
Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations
USA. ProQuest, 2005
005.8 DAT
017825
Davis, Carlton R.
IPSec: Securing VPNs
New Delhi. Tata McGraw-Hill, 2001
005.8 DAV
003911
De Morais Cordeiro, Carlos & Agrawal, Dharma Prakash
Ad hoc and sensor networks: theory and applications.
Singapore. World Scientific, 2006.
621.3821 DE
014843
Debbabi, Mourad ... [et al.].
Embedded Java security : security for mobile devices
London. Springer, 2007
005.8 DEB
019504
Deibert, Ronald. ed...[et al.].
Access denied : the practice and policy of global Internet filtering
Cambridge. MIT Press, 2008
005.8 DEI
019658
Delfs, Hans.,
Introduction to Cryptography
New York . Springer-Verlag , 2002
005.82 D351I
003851
Dingledine, Roger, ed. & Syverson, Paul, ed.
Privacy enhancing technologies : Second international workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, revised papers
Berlin. Springer-Verlag, 2003
004 DIN
007166
Douligeris, Christos, ed. & Serpanos, Dimitrios N., ed.
Network security : current status and future directions
Hoboken. John Wiley & Sons, 2007
005.8 DOU
016412
Dournaee, Blake
XML security
New York. McGraw-Hill, 2002
005.8 DOU
011362
Drira, Khalil, ed., Martelli, Andrea, ed. & Villemur, Thierry, ed.
Cooperative environments for distributed systems engineering : the distributed systems environment report
Berlin. Springer, 2001
004 DRI
009025
Easttom, Chuck
Computer security fundamentals
UpperSaddleRiver. Prentice Hall of India, 2005
005.8 EAS
016414
Edney, Jon & Arbaugh, William A.
Real 802.11 security : Wi-Fi protected access and 802.11i
Delhi. Pearson Education, 2004
005.8 EDN
008536
Egan, Mark & Mather, Tim
Executive guide to information security : threats, challenges, and solutions. Indianapolis
Addison-Wesley, 2005
005.8 EGA
013611
Eggers, Joachim
Informed watermarking
Boston. Kluwer Academic Publishers, 2002
005.8 EGG
016468
Elbirt, Adam J.
Understanding and applying cryptography and data security
Boca Raton. Auerbach Publications, 2009
005.8 ELB
023030
Ellis, Juanita
Internet Security Guidebook
London . Academic Press , 2001
005.8 ELL
002603
Endler, David & Collier, Mark
Hacking exposed VoIP : voice over IP security secrets and solutions
New Delhi. Tata McGraw-Hill, 2007
005.8 END
015548
Erickson, Jon
Hacking : the art of exploitation
Mumbai. SPD, 2003
005.8 ERI
011275
Fadia, Ankit
Network Security
Delhi . Macmillan , 2003
005.8 FAD
004461
Fadia, Ankit
E-mail hacking : learn e-mail hacking the easy way
New Delhi. Vikas Pub. House, 2006
005.8 FAD
021548
Fadia, Ankit
Ethical hacking guide to corporate security
Delhi. MacMillan India, 2004
005.8 FAD
013491
Fadia, Ankit
Unofficial guide to ethical hacking, 2nd ed.
Boston. Thomson Course Technology, 2005
005.8 FAD
020979
Fadia, Ankit & Bhattacharjee, Jaya
Encryption : protecting your data
New Delhi. Vikas Publishing House, 2007
005.8 FAD
024715
Fadia, Ankit & Patnaik, Nishant Das
Software hacking
New Delhi. Vikas Publishing House, 2010
005.8 FAD
024714
Fadia, Ankit & Zacharia, Manu
Network intrusion alert : an ethical hacking guide to intrusion detection
Boston. Thomson Course Technology, 2008
005.8 FAD
020978
Farmer, Dan & Venema, Wietse
Forensic discovery
Boston, Addison-Wesley, 2004
005.8 FAR
012130
Feghhi, Jalala, Feghhi, Jalil & Williams, Peter
Digital certificates : applied internet security
Reading. Addison-Wesley, 1999
005.8 FEG
005828
Ferraiolo, David F.,
Role-based access control
Boston. Artech House, 2003
005.8 FER
007093
Ferraiolo, David F., Kuhn, D. Richard & Chandramouli, Ramaswamy.,
Role-based access control, 2nd ed.
Boston. Artech House, 2007
005.8 FER
018160
Ferrari, Elena & Thuraisingham, Bhavani
Web and information security
Hershey. IRM Press, 2006
005.8 FER
018737
Ferrari, Elena & Thuraisingham, Bhavani
Web and information security
Hershey. IRM Press, 2006
005.8 FER
018737
Fischer-Hubner, Simone
IT-security and privacy : design and use of privacy-enhancing security mechanisms
Berlin. Springer, 2001
005.8 FIS
011430
Fischer-Hubner, Simone
IT-security and privacy : design and use of privacy-enhancing security mechanisms
Berlin. Springer, 2001
005.8 FIS
011430
Flegel, Ulrich
Privacy-respecting intrusion detection
New York. Springer, 2007
005.8 FLE
021846
Flegel, Ulrich.,
Privacy-respecting intrusion detection
New York. Springer, 2007
005.8 FLE
021846
Fletcher, Peter, Poon, Alex, Pearce, Ben & Comber, Peter.,
Practical Web traffic analysis : standards, privacy, techniques, results
UK. Springer-Verlag, 2002
004.678 FLE
008457
Fokkink, Wan.,
Modelling distributed systems
Berlin. Springer, 2007
003.78 FOK
018228
Forouzan, Behrouz A.
Cryptography and network security
Boston. McGraw-Hill, 2007
005.8 FOR
017909
Friedman, Lawrence Meir.,
Guarding life's dark secrets : legal and social controls over reputation, propriety, and privacy
Stanford. StanfordUniversity press, 2007
342.730858 FRI
025000
Fry, Chris & Nystrom, Martin
Security monitoring
Sebastopol. O'Reilly, 2009
005.8 FRY
022322
Fung, Kwok T.
Network security technologies, 2nd ed.
Boca Raton. Auerbach Publications, 2005
005.8 FUN
012771
Gabillon, Alban, Sheng, Quan Z. & Mansoor, Watiq.,
Web-based information technologies and distributed systems
Paris. Atlantis Press, 2010
005.438 GAB
025266
Gallagher, Tom, Jeffries, Bryan & Landauer, Lawrence
Hunting security bugs
Redmond. Microsoft Press, 2006
005.8 GAL
016471
Galloway, Alexander R.
Protocol : how control exists after decentralization
Cambridge. MIT Press, 2004
005.8 GAL 009779
Garfinkel, Simson
Web Security, Privacy and Commerce
Mumbai . Shroff Publishers , 2002
005.8 G231W
004793
Garfinkel, Simson
Practical Unix and internet security, 3rd ed.
Navi Mumbai. Shroff Publishers, 2003
005.8 GAR
008135 - 008136
Garfinkel, Simson.,
Web Security, Privacy and Commerce
Mumbai. Shroff Publishers, 2002
005.8 GAR
004793
Garfinkel, Simson.,
Database nation: Death of privacy in the 21st century
Mumbai. Shroff Publishers, 2000
006.6 GAR
002114
Garfinkel, Simson.,
Web Security, Privacy and Commerce
Mumbai . Shroff Publishers , 2002
005.8 GAR
004793
Garg, Vijay K.,
Principles of distributed systems
Boston. Kluwer Academic, 1996
005.2 GAR
014511
Gatherer, Alan ed. & Auslander, Edgar ed.,
Application of Programmable DSPs in Mobile Communications
New York. John Wiley & Sons, 2002
621.38 GAT
001777
Gaura, Elena & Newman, Robert
Smart MEMS and sensor systems.
London. ImperialCollege Press, 2006.
681.222 GAU