//]]>
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Robustness under Large-Scale Attacks by Zhou, Qing. Publication: . VIII, 41 p. 12 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data-Driven Methods for Adaptive Spoken Dialogue Systems by Lemon, Oliver. Publication: . IX, 177 p. 35 illus., 8 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Mining Applications Using Artificial Adaptive Systems by Tastle, William J. Publication: . VII, 275 p. 135 illus., 111 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Algebra to Communications, Control, and Signal Processing by Boston, Nigel. Publication: . XIII, 44p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Survey of Data Leakage Detection and Prevention Solutions by Shabtai, Asaf. Publication: . VIII, 92 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Designing Sorting Networks by Al-Haj Baddar, Sherenaz W. Publication: . XII, 136 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Concise Guide to Databases by Lake, Peter. Publication: . XIX, 307 p. 113 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mapping Scientific Frontiers by Chen, Chaomei. Publication: . XXXVII, 344 p. 232 illus., 148 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Cloud Computing by Hill, Richard. Publication: . XXI, 278 p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Identity-Based Encryption by Chatterjee, Sanjit. Publication: . XI, 182p. 19 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantum Attacks on Public-Key Cryptosystems by Yan, Song Y. Publication: . VIII, 207 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Preserving Privacy in Data Outsourcing by Foresti, Sara. Publication: . XV, 180 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grids and Service-Oriented Architectures for Service Level Agreements by Wieder, Philipp. Publication: . XIII, 171p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية