//]]>
Medical Content-Based Retrieval for Clinical Decision Support by Müller, Henning. Publication: . X, 153 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Security: From Theory to Applications by Naccache, David. Publication: . XIII, 502 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Internet Technology by Ramanujam, R. Publication: . XI, 277p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Trends in Web Engineering by Harth, Andreas. Publication: . XXXII, 361p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIII, 253 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Jung, Souhwan. Publication: . XII, 271p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Problems in Network Security by Camenisch, Jan. Publication: . VIII, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . Approx. 335 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Prouff, Emmanuel. Publication: . XI, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical and Engineering Methods in Computer Science by Kotásek, Zdeněk. Publication: . XII, 215p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XIX by Christianson, Bruce. Publication: . IX, 383 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware 2011 by Kon, Fabio. Publication: . XIII, 514 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2011 by Bernstein, Daniel J. Publication: . XIII, 401 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Jajodia, Sushil. Publication: . XV, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Kappel, Gerti. Publication: . XVIII, 680 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Yang, Bo-Yin. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011 Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2011 by Lee, Dong Hoon. Publication: . XIV, 760 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
RFID. Security and Privacy by Juels, Ari. Publication: . X, 260p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 362p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Baras, John S. Publication: . X, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية