//]]>
Advances in Cryptology – CRYPTO 2012 by Safavi-Naini, Reihaneh. Publication: . XV, 888 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 319p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems by Askoxylakis, Ioannis. Publication: . XII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Katzenbeisser, Stefan. Publication: . XII, 341p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Meadows, Catherine. Publication: . X, 239p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Petkova-Nikova, Svetla. Publication: . X, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Barthe, Gilles. Publication: . X, 279 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Ryan, Mark D. Publication: . XIII, 406p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection by Lopez, Javier. Publication: . XIV, 357 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneus Security by Garcia-Alfaro, Joaquin. Publication: . XV, 319 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VII by Shi, Yun Q. Publication: . IX, 115p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Degano, Pierpaolo. Publication: . XIV, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Problems in Network Security by Camenisch, Jan. Publication: . VIII, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . Approx. 335 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Security and Applications by Mödersheim, Sebastian. Publication: . IX, 225 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XIX by Christianson, Bruce. Publication: . IX, 383 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 362p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Iwata, Tetsu. Publication: . XII, 231 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 Next >>

Languages: 
English |
العربية