//]]>
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2010 by Carlet, Claude. Publication: . X, 465p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 172p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Vinel, Alexey. Publication: . XIII, 287p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Garay, Juan A. Publication: . VII, 474p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Katsikas, Sokratis. Publication: . XII, 252p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2010 by Rabin, Tal. Publication: . XIV, 744p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 263p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Rome, Erich. Publication: . XII, 213p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Services and Applications - Engineering, Control and Management by Aagesen, Finn Arve. Publication: . XIII, 275p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Acquisti, Alessandro. Publication: . XIII, 441p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Hong, Seokhie. Publication: . XI, 385p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXIV by Foresti, Sara. Publication: . XIII, 376p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية