//]]>
Advances in Digital Forensics VIII by Peterson, Gilbert. Publication: . XVIII, 333 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Rajarajan, Muttukrishnan. Publication: . XIV, 548 p. 174 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection V by Butts, Jonathan. Publication: . XIV, 218 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure and Trust Computing, Data Management and Applications by Park, James J. Publication: . XV, 252 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Digital Forensics by Weerasinghe, Dasun. Publication: . 196p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Emerging Wireless Communication and Networking Systems by Gu, Qijun. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Zia, Tanveer. Publication: . XII, 420 p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and the Networked Society by Gregory, Mark A. Publication: . XVI, 297 p. 62 illus., 59 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automated Security Management by Al-Shaer, Ehab. Publication: . VIII, 187 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Assessment in Vehicular Networks by Du, Suguo. Publication: . XI, 49 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks by Tang, Jin. Publication: . X, 86 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Financial and Medical Identity Theft by Camp, L. Jean. Publication: . XI, 166p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense by Jajodia, Sushil. Publication: . XVI, 184 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية