//]]>
Web Information Systems and Mining by Wang, Fu Lee. Publication: . XVIII, 718 p. 271 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Balzarotti, Davide. Publication: . XIV, 400 p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2012 by Foresti, Sara. Publication: . XVII, 896 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . VIII, 239 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multidisciplinary Research and Practice for Information Systems by Quirchmayr, Gerald. Publication: . XV, 683 p. 235 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business System Management and Engineering by Ardagna, Claudio A. Publication: . X, 197 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Susilo, Willy. Publication: . XIV, 460p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Aura, Tuomas. Publication: . X, 289 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Internet Technologies by Su, Jinshu. Publication: . XII, 277 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Computing and Communications by Thampi, Sabu M. Publication: . XVI, 404 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Rogers, Marcus. Publication: . XIV, 329 p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Gladyshev, Pavel. Publication: . XII, 297 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Global Security, Safety and Sustainability & e-Democracy by Georgiadis, Christos K. Publication: . XIV, 290 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ICT Critical Infrastructures and Society by Hercheui, Magda David. Publication: . X, 399 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Security by Aschenbruck, Nils. Publication: . Approx. 530 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet of Things by Wang, Yongheng. Publication: . Approx. 695 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 Next >>

Languages: 
English |
العربية