//]]>
Data and Applications Security and Privacy XXV by Li, Yingjiu. Publication: . XI, 309p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 285 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2011 by Nitaj, Abderrahmane. Publication: . XIII, 387p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Joux, Antoine. Publication: . XI, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wired/Wireless Internet Communications by Masip-Bruin, Xavier. Publication: . XV, 506 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Lopez, Javier. Publication: . XIII, 552 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Lai, Xuejia. Publication: . XIV, 524p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence in Security for Information Systems by Herrero, Álvaro. Publication: . XIV, 310p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication by Ardagna, Claudio A. Publication: . XIII, 392 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Bao, Feng. Publication: . XIII, 448p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Fehr, Serge. Publication: . X, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2011 by Paterson, Kenneth G. Publication: . XIV, 628p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Degano, Pierpaolo. Publication: . X, 239 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Ishai, Yuval. Publication: . XII, 631 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2011 by Catalano, Dario. Publication: . XIII, 495p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Research Problems in Network Security by Camenisch, Jan. Publication: . VIII, 171 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2011 by Kiayias, Aggelos. Publication: . XIII, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Burmester, Mike. Publication: . XIV, 446p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Chung, Yongwha. Publication: . XIII, 352p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Jha, Somesh. Publication: . XIV, 261p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية