//]]>
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security and Privacy by Felici, Massimo. Publication: . XIV, 177 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics IX by Peterson, Gilbert. Publication: . XX, 398 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Security of Information and Communication Networks by Awad, Ali Ismail. Publication: . XII, 249 p. 104 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Computing and Communications by Thampi, Sabu M. Publication: . XVI, 404 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Rogers, Marcus. Publication: . XIV, 329 p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Information Security and Privacy by Böhme, Rainer. Publication: . XIII, 321 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Assurance and Security Education and Training by Dodge, Ronald C. Publication: . XII, 297 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust Management VII by Fernández-Gago, Carmen. Publication: . XII, 289 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quality, Reliability, Security and Robustness in Heterogeneous Networks by Singh, Karan. Publication: . XVIII, 1011 p. 488 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Policies and Research in Identity Management by Fischer-Hübner, Simone. Publication: . X, 161 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XII, 366 p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Keromytis, Angelos D. Publication: . X, 369 p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Personal Satellite Services by Pillai, Prashant. Publication: . XIV, 197 p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Computing and Services by Yuan, Yuyu. Publication: . XVIII, 739 p. 301 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VI by Butts, Jonathan. Publication: . XVI, 233 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Gladyshev, Pavel. Publication: . XII, 297 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية