//]]>
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Cuellar, Jorge. Publication: . X, 271 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Holz, Thorsten. Publication: . X, 235p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXV by Li, Yingjiu. Publication: . XI, 309p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 285 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVI by Christianson, Bruce. Publication: . IX, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 133p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent and Multi-Agent Systems: Technologies and Applications by O’Shea, James. Publication: . XVII, 704p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2011 by Nitaj, Abderrahmane. Publication: . XIII, 387p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Interface and the Management of Information. Interacting with Information by Smith, Michael J. Publication: . XXX, 673p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Joux, Antoine. Publication: . XI, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Xenakis, Christos. Publication: . X, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by McCune, Jonathan M. Publication: . VII, 314p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wired/Wireless Internet Communications by Masip-Bruin, Xavier. Publication: . XV, 506 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Classifier Systems by Sansone, Carlo. Publication: . XII, 372p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Lopez, Javier. Publication: . XIII, 552 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Lai, Xuejia. Publication: . XIV, 524p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence in Security for Information Systems by Herrero, Álvaro. Publication: . XIV, 310p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication by Ardagna, Claudio A. Publication: . XIII, 392 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Bao, Feng. Publication: . XIII, 448p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية