//]]>
Security and the Networked Society by Gregory, Mark A. Publication: . XVI, 297 p. 62 illus., 59 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVII, 335p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense by Jajodia, Sushil. Publication: . XVI, 184 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVIII, 372 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Cloud Computing by Hill, Richard. Publication: . XXI, 278 p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Embedded Multimedia Security Systems by Pande, Amit. Publication: . XVII, 146 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive Cryptographic Access Control by Kayem, Anne V. D. M. Publication: . XIV, 138 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software for Digital Forensics by Huebner, Ewa. Publication: . VII, 117p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Situational Awareness by Jajodia, Sushil. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Intrusion Detection and Prevention by Ghorbani, Ali A. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Spyware and Adware by Aycock, John. Publication: . XIV, 146 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Biometrics by Jain, Anil K. Publication: . XVI, 312 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Camenisch, Jan. Publication: . XXIV, 512p. 122 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing Risk and Information Security by Harkins, Malcolm. Publication: . XVII, 152 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية