//]]>
Information Security, Practice and Experience by Kwak, Jin. Publication: . XIII, 399p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2010 by Bernstein, Daniel J. Publication: . XIII, 437p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethics and Policy of Biometrics by Kumar, Ajay. Publication: . VIII, 169p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Application by Gollmann, Dieter. Publication: . X, 239p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects in Security and Trust by Degano, Pierpaolo. Publication: . X, 279p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices by Samarati, Pierangela. Publication: . XIII, 386p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2010 by Taniar, David. Publication: . XIX, 540 p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2010 by Taniar, David. Publication: . XIX, 570p. 284 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2010 by Taniar, David. Publication: . XIX, 602p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2010 by Taniar, David. Publication: . XXXVII, 628p. 271 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Nguyen, Ngoc Thanh. Publication: . XXIII, 477p. 196 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database Systems for Advanced Applications by Kitagawa, Hiroyuki. Publication: . XX, 485p. 256 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Social Computing by Chai, Sun-Ki. Publication: . XV, 426p. 126 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database Systems for Advanced Applications by Kitagawa, Hiroyuki. Publication: . XXVIII, 646 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology - CT-RSA 2010 by Pieprzyk, Josef. Publication: . 397p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Massacci, Fabio. Publication: . X, 241 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Internet Technology by Janowski, Tomasz. Publication: . XV, 283p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Kant, Krishna. Publication: . XIX, 522p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية