//]]>
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Luiijf, Eric. Publication: . XIV, 219 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyberspace Safety and Security by Wang, Guojun. Publication: . XXVI, 480 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2013 by Paul, Goutam. Publication: . XVIII, 319 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Bloem, Roderick. Publication: . XII, 103 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Higashino, Teruo. Publication: . XXIV, 380 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Abdalla, Michel. Publication: . XVIII, 349 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Das, Sajal K. Publication: . X, 265 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Qing, Sihan. Publication: . XIV, 414 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
I contenuti digitali by Lucchi, Nicola. Publication: . XIII, 315 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Ubiquitous Computing by Khalil, Ismail. Publication: . XIX, 267 p. 117 illus., 47 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Crittografia nel Paese delle Meraviglie by Venturi, Daniele. Publication: . XIV, 500 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks by Raghavan, S.V. Publication: . XVI, 348 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ISSE 2009 Securing Electronic Business Processes by Pohlmann, Norbert. Publication: . XVI, 368p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Flow Based Security Control Beyond RBAC by Fischer-Hellmann, Klaus-Peter. Publication: . XXI, 161 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy Preserving in Social Networks by Chbeir, Richard. Publication: . XVI, 367 p. 107 illus., 66 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Counterterrorism and Open Source Intelligence by Wiil, Uffe Kock. Publication: . XVIII, 458 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ISSE 2013 Securing Electronic Business Processes by Reimer, Helmut. Publication: . XV, 282 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Internet Technologies by Su, Jinshu. Publication: . XII, 277 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VII by Butts, Jonathan. Publication: . XVI, 227 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية