//]]>
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Security of Information and Communication Networks by Awad, Ali Ismail. Publication: . XII, 249 p. 104 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Computing and Communications by Thampi, Sabu M. Publication: . XVI, 404 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Rogers, Marcus. Publication: . XIV, 329 p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Information Security and Privacy by Böhme, Rainer. Publication: . XIII, 321 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
HCI International 2013 - Posters’ Extended Abstracts by Stephanidis, Constantine. Publication: . XLIII, 773 p. 279 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Assurance and Security Education and Training by Dodge, Ronald C. Publication: . XII, 297 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy Protection in Information Processing Systems by Janczewski, Lech J. Publication: . XIV, 436 p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Communications, Services and Security by Dziech, Andrzej. Publication: . XIV, 325 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Information Systems Engineering Workshops by Franch, Xavier. Publication: . XLIV, 532 p. 167 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Information Systems by Abramowicz, Witold. Publication: . XIV, 223 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust Management VII by Fernández-Gago, Carmen. Publication: . XII, 289 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quality, Reliability, Security and Robustness in Heterogeneous Networks by Singh, Karan. Publication: . XVIII, 1011 p. 488 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Policies and Research in Identity Management by Fischer-Hübner, Simone. Publication: . X, 161 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XII, 366 p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Keromytis, Angelos D. Publication: . X, 369 p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Personal Satellite Services by Pillai, Prashant. Publication: . XIV, 197 p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computing, Communication, and Control by Unnikrishnan, Srija. Publication: . XVIII, 751 p. 452 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management Workshops by Rosa, Marcello. Publication: . LVI, 783 p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer and Computing Technologies in Agriculture VI by Li, Daoliang. Publication: . XVIII, 455 p. 237 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية