//]]>
Open Research Problems in Network Security by Camenisch, Jan. Publication: . VIII, 171 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Erlingsson, Úlfar. Publication: . XI, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2011 by Kiayias, Aggelos. Publication: . XIII, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Chung, Yongwha. Publication: . XIII, 352p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols by Christianson, Bruce. Publication: . VIII, 257p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Jha, Somesh. Publication: . XIV, 261p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XI by Gavrilova, Marina L. Publication: . XVIII, 294p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Soriano, Miguel. Publication: . XIV, 474p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Heng, Swee-Huay. Publication: . XIII, 355p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science X by Gavrilova, Marina L. Publication: . XVIII, 366p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography - Pairing 2010 by Joye, Marc. Publication: . XIII, 467p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2010 by Gong, Guang. Publication: . XVI, 366p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Alpcan, Tansu. Publication: . X, 281p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Echizen, Isao. Publication: . XIII, 371p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification: Security and Privacy Issues by Ors Yalcin, Siddika Berna. Publication: . X, 271p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Xie, Bing. Publication: . XVII, 328p. 112 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Martinelli, Fabio. Publication: . X, 303p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Bao, Feng. Publication: . XIII, 460p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security by Armando, Alessandro. Publication: . IX, 185p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية