//]]>
Security and Privacy Protection in Information Processing Systems by Janczewski, Lech J. Publication: . XIV, 436 p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quality, Reliability, Security and Robustness in Heterogeneous Networks by Singh, Karan. Publication: . XVIII, 1011 p. 488 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XII, 366 p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Bio-technology, Multimedia, and Ubiquitous City by Kim, Tai-hoon. Publication: . XXII, 408 p. 239 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Security, Control and System Engineering by Kim, Tai-hoon. Publication: . XX, 488 p. 228 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Computer Networks and Distributed Systems Security by Thampi, Sabu M. Publication: . XXI, 508 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Camenisch, Jan. Publication: . XIII, 293p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy Research by Gritzalis, Dimitris. Publication: . XI, 578p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Simplot-Ryl, David. Publication: . VIII, 239p. 123 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Technology by Kim, Tai-hoon. Publication: . Approx. 250 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection V by Butts, Jonathan. Publication: . XIV, 218 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics VII by Peterson, Gilbert. Publication: . XVIII, 290 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Network Security and Applications by Wyld, David C. Publication: . XVIII, 660 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Challenges in Security and Privacy for Academia and Industry by Camenisch, Jan. Publication: . XIV, 330 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Fischer-Hübner, Simone. Publication: . XII, 356 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XIV, 542p. 272 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Technology, Disaster Recovery and Business Continuity by Kim, Tai-hoon. Publication: . XIII, 300p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communication and Networking by Kim, Tai-hoon. Publication: . XII, 250p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Mobile Information and Communication Systems by Schmidt, Andreas U. Publication: . XII, 176p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Jajodia, Sushil. Publication: . XIII, 500p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية