//]]>
Information Security by Lai, Xuejia. Publication: . XIII, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Aspects in Information Technology by Joye, Marc. Publication: . XIV, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VI by Shi, Yun Q. Publication: . XI, 110p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Défago, Xavier. Publication: . XIV, 452 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dependable and Historic Computing by Jones, Cliff B. Publication: . XII, 523p. 137 illus., 60 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Boyen, Xavier. Publication: . XIII, 399 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Flammini, Francesco. Publication: . XI, 482p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2010 by Rhee, Kyung-Hyune. Publication: . XIII, 435p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2011 by Preneel, Bart. Publication: . XIV, 524 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Calero, Jose M. Alcaraz. Publication: . XII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Security Analysis and Design VI by Aldini, Alessandro. Publication: . VII, 275p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2011 by Rogaway, Phillip. Publication: . XV, 782p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Camenisch, Jan. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXV by Li, Yingjiu. Publication: . XI, 309p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 285 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2011 by Nitaj, Abderrahmane. Publication: . XIII, 387p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Joux, Antoine. Publication: . XI, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wired/Wireless Internet Communications by Masip-Bruin, Xavier. Publication: . XV, 506 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Lopez, Javier. Publication: . XIII, 552 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Lai, Xuejia. Publication: . XIV, 524p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية