//]]>
Cryptographic Hardware and Embedded Systems – CHES 2011 by Preneel, Bart. Publication: . XIV, 524 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Soriano, Miguel. Publication: . XIV, 474p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy in Statistical Databases by Domingo-Ferrer, Josep. Publication: . XI, 297p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems, CHES 2010 by Mangard, Stefan. Publication: . XIII, 458p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Crittografia nel Paese delle Meraviglie by Venturi, Daniele. Publication: . XIV, 500 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Flow Based Security Control Beyond RBAC by Fischer-Hellmann, Klaus-Peter. Publication: . XXI, 161 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Information Security and Privacy by Böhme, Rainer. Publication: . XIII, 321 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Information Security by Basin, David. Publication: . XIV, 202 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Protocol by Dong, Ling. Publication: . 250p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XVI, 915p. 450 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Digital Forensics by Weerasinghe, Dasun. Publication: . 196p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Emerging Wireless Communication and Networking Systems by Gu, Qijun. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding Cryptography by Paar, Christof. Publication: . XVIII, 372p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 Next >>

Languages: 
English |
العربية