//]]>
Network and System Security by Xu, Li. Publication: . XIV, 532 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems and Mining by Wang, Fu Lee. Publication: . XVIII, 718 p. 271 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Balzarotti, Davide. Publication: . XIV, 400 p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2012 by Foresti, Sara. Publication: . XVII, 896 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . VIII, 239 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multidisciplinary Research and Practice for Information Systems by Quirchmayr, Gerald. Publication: . XV, 683 p. 235 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business System Management and Engineering by Ardagna, Claudio A. Publication: . X, 197 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Susilo, Willy. Publication: . XIV, 460p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Aura, Tuomas. Publication: . X, 289 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Interface and the Management of Information. Interacting with Information by Smith, Michael J. Publication: . XXX, 673p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Internet Technologies by Su, Jinshu. Publication: . XII, 277 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Computing and Communications by Thampi, Sabu M. Publication: . XVI, 404 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Rogers, Marcus. Publication: . XIV, 329 p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Gladyshev, Pavel. Publication: . XII, 297 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Global Security, Safety and Sustainability & e-Democracy by Georgiadis, Christos K. Publication: . XIV, 290 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 Next >>

Languages: 
English |
العربية