//]]>
Cyber Security and Privacy by Felici, Massimo. Publication: . XIV, 177 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics IX by Peterson, Gilbert. Publication: . XX, 398 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Security of Information and Communication Networks by Awad, Ali Ismail. Publication: . XII, 249 p. 104 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Computing and Communications by Thampi, Sabu M. Publication: . XVI, 404 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Assurance and Security Education and Training by Dodge, Ronald C. Publication: . XII, 297 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust Management VII by Fernández-Gago, Carmen. Publication: . XII, 289 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quality, Reliability, Security and Robustness in Heterogeneous Networks by Singh, Karan. Publication: . XVIII, 1011 p. 488 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XII, 366 p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Keromytis, Angelos D. Publication: . X, 369 p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Personal Satellite Services by Pillai, Prashant. Publication: . XIV, 197 p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Computing and Services by Yuan, Yuyu. Publication: . XVIII, 739 p. 301 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Computing and Information Security by Lei, Jingsheng. Publication: . XX, 829 p. 104 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Computer Networks and Distributed Systems Security by Thampi, Sabu M. Publication: . XXI, 508 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics VIII by Peterson, Gilbert. Publication: . XVIII, 333 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Global Security, Safety and Sustainability & e-Democracy by Georgiadis, Christos K. Publication: . XIV, 290 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Mobile Information and Communication Systems by Schmidt, Andreas U. Publication: . VIII, 130 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Convergence and Hybrid Information Technology by Lee, Geuk. Publication: . Approx. 830 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet of Things by Wang, Yongheng. Publication: . Approx. 695 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية