//]]>
Engineering Secure Software and Systems by Erlingsson, Úlfar. Publication: . XI, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Soriano, Miguel. Publication: . XIV, 474p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy in Statistical Databases by Domingo-Ferrer, Josep. Publication: . XI, 297p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems, CHES 2010 by Mangard, Stefan. Publication: . XIII, 458p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Massacci, Fabio. Publication: . X, 241 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Crittografia nel Paese delle Meraviglie by Venturi, Daniele. Publication: . XIV, 500 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Information Security and Privacy by Böhme, Rainer. Publication: . XIII, 321 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management Workshops by Rosa, Marcello. Publication: . LVI, 783 p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Cryptography with Maple by Gómez Pardo, José Luis. Publication: . XXX, 705 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Two-Party Computation Protocols by Schneider, Thomas. Publication: . XVI, 138 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
e-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 448 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Information Security by Basin, David. Publication: . XIV, 202 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Protocol by Dong, Ling. Publication: . 250p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Assurance by Kim, Tai-hoon. Publication: . XIV, 406p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Communications, Services and Security by Dziech, Andrzej. Publication: . XIV, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 Next >>

Languages: 
English |
العربية