//]]>
Smart Card Research and Advanced Applications by Prouff, Emmanuel. Publication: . XI, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
RFID. Security and Privacy by Juels, Ari. Publication: . X, 260p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Lai, Xuejia. Publication: . XIII, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Sacchi, Claudio. Publication: . XIII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Calero, Jose M. Alcaraz. Publication: . XII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 Workshops by Casares-Giner, Vicente. Publication: . XVI, 290p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Xenakis, Christos. Publication: . X, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 by Domingo-Pascual, Jordi. Publication: . XXII, 381 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 by Domingo-Pascual, Jordi. Publication: . XXI, 473 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Erlingsson, Úlfar. Publication: . XI, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Burmester, Mike. Publication: . XIV, 446p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science X by Gavrilova, Marina L. Publication: . XVIII, 366p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification: Security and Privacy Issues by Ors Yalcin, Siddika Berna. Publication: . X, 271p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Xie, Bing. Publication: . XVII, 328p. 112 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security by Armando, Alessandro. Publication: . IX, 185p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Vinel, Alexey. Publication: . XIII, 287p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Rome, Erich. Publication: . XII, 213p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecting Critical Systems by Giese, Holger. Publication: . 205p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2010 by Crovella, Mark. Publication: . XVI, 410p. 181 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 Next >>

Languages: 
English |
العربية