//]]>
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks by Raghavan, S.V. Publication: . XVI, 348 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ISSE 2009 Securing Electronic Business Processes by Pohlmann, Norbert. Publication: . XVI, 368p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Flow Based Security Control Beyond RBAC by Fischer-Hellmann, Klaus-Peter. Publication: . XXI, 161 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Linguistic Identity Matching by Lisbach, Bertrand. Publication: . XVII, 244 p. 8 illus., 4 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy Preserving in Social Networks by Chbeir, Richard. Publication: . XVI, 367 p. 107 illus., 66 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Information Reuse and Integration by Özyer, Tansel. Publication: . XVI, 400 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Counterterrorism and Open Source Intelligence by Wiil, Uffe Kock. Publication: . XVIII, 458 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ISSE 2013 Securing Electronic Business Processes by Reimer, Helmut. Publication: . XV, 282 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Games for Health by Schouten, Ben. Publication: . XI, 308 p. 83 illus., 70 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multilayered Security and Privacy Protection in Car-to-X Networks by Stübing, Hagen. Publication: . XVII, 191 p. 82 illus., 26 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Internet Technologies by Su, Jinshu. Publication: . XII, 277 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VII by Butts, Jonathan. Publication: . XVI, 227 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Information Systems Workshops by Abramowicz, Witold. Publication: . XXIV, 315 p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Practice of Enterprise Modeling by Grabis, Janis. Publication: . XIV, 293 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Multimedia Surveillance by Atrey, Pradeep K. Publication: . IX, 192 p. 76 illus., 57 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security and Privacy by Felici, Massimo. Publication: . XIV, 177 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics IX by Peterson, Gilbert. Publication: . XX, 398 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems: Development, Learning, Security by Wrycza, Stanisław. Publication: . XII, 95 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية