//]]>
Intelligence Management by Akhgar, Babak. Publication: . XVI, 232 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Preserving Privacy in Data Outsourcing by Foresti, Sara. Publication: . XV, 180 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy by Moore, Tyler. Publication: . XVI, 320p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software for Digital Forensics by Huebner, Ewa. Publication: . VII, 117p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Situational Awareness by Jajodia, Sushil. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encryption for Digital Content by Kiayias, Aggelos. Publication: . XIII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transparent User Authentication by Clarke, Nathan. Publication: . XVIII, 229p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Systems Safety by Dale, Chris. Publication: . X, 315p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Elements of Computer Security by Salomon, David. Publication: . XX, 375p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Intrusion Detection and Prevention by Ghorbani, Ali A. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Healthcare Information Security by Shoniregun, Charles A. Publication: . XXI, 190 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Spyware and Adware by Aycock, John. Publication: . XIV, 146 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Enterprise Identity Management by Royer, Denis. Publication: . XX, 219 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Informatics by Yang, Christopher C. Publication: . VI, 206p. 120 illus., 60 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data privacy and security / by Salomon, David Publication: New York : Springer, 2003 . xiv, 465 p. : 24 cm. Date:2003 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Security of data and transaction processing /   Publication: Boston, MA : Kluwer Academic, 2000 . 141 p. : 24 cm. Date:2000 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Digital rights management : , technological, economic, legal and political aspects /   Publication: Berlin : Springer, 2003 . xi, 805 p. ; 24 cm. Date:2003 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Handbook of information security /   Publication: New York : Willford Press, 2016 . vii, 269 p. : 28 cm. Date:2016 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية