//]]>
Securing Digital Video by Diehl, Eric. Publication: . X, 264 p. 99 illus., 11 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Policies and Research in Identity Management by Leeuw, Elisabeth. Publication: . X, 145p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection IV by Moore, Tyler. Publication: . XVIII, 260p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XVI, 915p. 450 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Digital Forensics by Weerasinghe, Dasun. Publication: . 196p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Emerging Wireless Communication and Networking Systems by Gu, Qijun. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding Cryptography by Paar, Christof. Publication: . XVIII, 372p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Practical Signcryption by Dent, Alexander W. Publication: . XVIII, 274 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Operational Semantics and Verification of Security Protocols by Cremers, Cas. Publication: . XIII, 172 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Survey of Data Leakage Detection and Prevention Solutions by Shabtai, Asaf. Publication: . VIII, 92 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Concise Guide to Databases by Lake, Peter. Publication: . XIX, 307 p. 113 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Preserving Privacy in Data Outsourcing by Foresti, Sara. Publication: . XV, 180 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية