//]]>
Applied Cryptography and Network Security by Zhou, Jianying. Publication: . XIII, 564p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIII, 281p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2010 by Gilbert, Henri. Publication: . XIV, 694p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2010 by Nguyen, Phong Q. Publication: . XIII, 519p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Trustworthy Elections by Chaum, David. Publication: . VIII, 403p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2010 by Crovella, Mark. Publication: . XVI, 410p. 181 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Sendrier, Nicolas. Publication: . X, 241p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security, Practice and Experience by Kwak, Jin. Publication: . XIII, 399p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2010 by Bernstein, Daniel J. Publication: . XIII, 437p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethics and Policy of Biometrics by Kumar, Ajay. Publication: . VIII, 169p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Application by Gollmann, Dieter. Publication: . X, 239p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects in Security and Trust by Degano, Pierpaolo. Publication: . X, 279p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices by Samarati, Pierangela. Publication: . XIII, 386p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy Protection in Information Processing Systems by Janczewski, Lech J. Publication: . XIV, 436 p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Policies and Research in Identity Management by Fischer-Hübner, Simone. Publication: . X, 161 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Keromytis, Angelos D. Publication: . X, 369 p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Bio-technology, Multimedia, and Ubiquitous City by Kim, Tai-hoon. Publication: . XXII, 408 p. 239 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Security, Control and System Engineering by Kim, Tai-hoon. Publication: . XX, 488 p. 228 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Rajarajan, Muttukrishnan. Publication: . XIV, 548 p. 174 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية