//]]>
The Block Cipher Companion by Knudsen, Lars R. Publication: . XIV, 270 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Policies and Research in Identity Management by Leeuw, Elisabeth. Publication: . X, 145p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection IV by Moore, Tyler. Publication: . XVIII, 260p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Power Electronics and Instrumentation Engineering by Das, Vinu V. Publication: . X, 114p. 95 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Hardware-Intrinsic Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 407 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Locally Decodable Codes and Private Information Retrieval Schemes by Yekhanin, Sergey. Publication: . XII, 82 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Efficient Secure Two-Party Protocols by Hazay, Carmit. Publication: . XIII, 263 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
VLSI-SoC: Design Methodologies for SoC and SiP by Piguet, Christian. Publication: . VIII, 287p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer and Computing Technologies in Agriculture III by Li, Daoliang. Publication: . XV, 561p. 246 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XVI, 915p. 450 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
High Performance Networking, Computing, Communication Systems, and Mathematical Foundations by Wu, Yanwen. Publication: . Approx. 110 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Digital Forensics by Weerasinghe, Dasun. Publication: . 196p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Emerging Wireless Communication and Networking Systems by Gu, Qijun. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding Cryptography by Paar, Christof. Publication: . XVIII, 372p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The LLL Algorithm by Nguyen, Phong Q. Publication: . XIV, 496 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Practical Signcryption by Dent, Alexander W. Publication: . XVIII, 274 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Operational Semantics and Verification of Security Protocols by Cremers, Cas. Publication: . XIII, 172 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Brief History of Cryptology and Cryptographic Algorithms by Dooley, John F. Publication: . XII, 99 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية